Cargando…

Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings /

The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Yung, Moti (Editor ), Dodis, Yevgeniy (Editor ), Kiayias, Aggelos (Editor ), Malkin, Tal (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Lecture Notes in Computer Science, 3958
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Cryptanalysis and Protocol Weaknesses
  • New Attacks on RSA with Small Secret CRT-Exponents
  • An Attack on a Modified Niederreiter Encryption Scheme
  • Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm
  • Distributed Crypto-computing
  • Efficient Polynomial Operations in the Shared-Coefficients Setting
  • Generic On-Line/Off-Line Threshold Signatures
  • Linear Integer Secret Sharing and Distributed Exponentiation
  • Encryption Methods
  • Encoding-Free ElGamal Encryption Without Random Oracles
  • Parallel Key-Insulated Public Key Encryption
  • Provably Secure Steganography with Imperfect Sampling
  • Cryptographic Hash and Applications
  • Collision-Resistant No More: Hash-and-Sign Paradigm Revisited
  • Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
  • Number Theory Algorithms
  • An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve
  • Efficient Scalar Multiplication by Isogeny Decompositions
  • Curve25519: New Diffie-Hellman Speed Records
  • Pairing-Based Cryptography
  • Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
  • Generalization of the Selective-ID Security Model for HIBE Protocols
  • Identity-Based Aggregate Signatures
  • On the Limitations of the Spread of an IBE-to-PKE Transformation
  • Cryptosystems Design and Analysis
  • Inoculating Multivariate Schemes Against Differential Attacks
  • Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol
  • High-Order Attacks Against the Exponent Splitting Protection
  • Signature and Identification
  • New Online/Offline Signature Schemes Without Random Oracles
  • Anonymous Signature Schemes
  • The Power of Identification Schemes
  • Authentication and Key Establishment
  • Security Analysis of KEA Authenticated Key Exchange Protocol
  • SAS-Based Authenticated Key Agreement
  • The Twist-AUgmented Technique for Key Exchange
  • Password-Based Group Key Exchange in a Constant Number of Rounds
  • Multi-party Computation
  • Conditional Oblivious Cast
  • Efficiency Tradeoffs for Malicious Two-Party Computation
  • PKI Techniques
  • On Constructing Certificateless Cryptosystems from Identity Based Encryption
  • Building Better Signcryption Schemes with Tag-KEMs
  • Security-Mediated Certificateless Cryptography
  • k-Times Anonymous Authentication with a Constant Proving Cost.