Normal view MARC view ISBD view

Public Key Cryptography - PKC 2007 [electronic resource] : 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings / edited by Tatsuaki Okamoto, Xiaoyun Wang.

Contributor(s): Okamoto, Tatsuaki [editor.] | Wang, Xiaoyun [editor.] | SpringerLink (Online service).
Material type: materialTypeLabelBookSeries: Security and Cryptology: 4450Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007Edition: 1st ed. 2007.Description: XIV, 498 p. online resource.Content type: text Media type: computer Carrier type: online resourceISBN: 9783540716778.Subject(s): Cryptography | Data encryption (Computer science) | Computer engineering | Computer networks  | Algorithms | Computers and civilization | Electronic data processing -- Management | Cryptology | Computer Engineering and Networks | Algorithms | Computer Communication Networks | Computers and Society | IT OperationsAdditional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification: 005.824 Online resources: Click here to access online
Contents:
Signatures I -- Full-Domain Subgroup Hiding and Constant-Size Group Signatures -- A Direct Anonymous Attestation Scheme for Embedded Devices -- Anonymous Signatures Made Easy -- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures -- Invited Talk I -- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol -- New Chosen-Ciphertext Attacks on NTRU -- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 -- Protocols I -- Optimistic Fair Exchange in a Multi-user Setting -- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures -- Knowledge-Binding Commitments with Applications in Time-Stamping -- Signatures II -- Efficient Ring Signatures Without Random Oracles -- Traceable Ring Signature -- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles -- Improved On-Line/Off-Line Threshold Signatures -- Multivariate Cryptosystems -- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems -- Cryptanalysis of HFE with Internal Perturbation -- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography -- Encryption -- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman -- Parallel Key-Insulated Public Key Encryption Without Random Oracles -- Multi-bit Cryptosystems Based on Lattice Problems -- Protocols II -- Practical and Secure Solutions for Integer Comparison -- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol -- Identity-Based Traitor Tracing -- Verifiable Shuffle of Large Size Ciphertexts -- Invited Talk II -- A Survey of Single-DatabasePrivate Information Retrieval: Techniques and Applications -- Number Theoretic Techniques -- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA -- Efficient Pseudorandom Generators Based on the DDH Assumption -- Fast Batch Verification of Multiple Signatures -- Public-Key Infrastructure -- A Closer Look at PKI: Security and Efficiency -- Self-Generated-Certificate Public Key Encryption Without Pairing.
In: Springer Nature eBook
    average rating: 0.0 (0 votes)
No physical items for this record

Signatures I -- Full-Domain Subgroup Hiding and Constant-Size Group Signatures -- A Direct Anonymous Attestation Scheme for Embedded Devices -- Anonymous Signatures Made Easy -- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures -- Invited Talk I -- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol -- New Chosen-Ciphertext Attacks on NTRU -- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 -- Protocols I -- Optimistic Fair Exchange in a Multi-user Setting -- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures -- Knowledge-Binding Commitments with Applications in Time-Stamping -- Signatures II -- Efficient Ring Signatures Without Random Oracles -- Traceable Ring Signature -- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles -- Improved On-Line/Off-Line Threshold Signatures -- Multivariate Cryptosystems -- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems -- Cryptanalysis of HFE with Internal Perturbation -- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography -- Encryption -- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman -- Parallel Key-Insulated Public Key Encryption Without Random Oracles -- Multi-bit Cryptosystems Based on Lattice Problems -- Protocols II -- Practical and Secure Solutions for Integer Comparison -- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol -- Identity-Based Traitor Tracing -- Verifiable Shuffle of Large Size Ciphertexts -- Invited Talk II -- A Survey of Single-DatabasePrivate Information Retrieval: Techniques and Applications -- Number Theoretic Techniques -- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA -- Efficient Pseudorandom Generators Based on the DDH Assumption -- Fast Batch Verification of Multiple Signatures -- Public-Key Infrastructure -- A Closer Look at PKI: Security and Efficiency -- Self-Generated-Certificate Public Key Encryption Without Pairing.

There are no comments for this item.

Log in to your account to post a comment.