Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings /
The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of...
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , , , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edición: | 1st ed. 2006. |
Colección: | Lecture Notes in Computer Science,
3958 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Cryptanalysis and Protocol Weaknesses
- New Attacks on RSA with Small Secret CRT-Exponents
- An Attack on a Modified Niederreiter Encryption Scheme
- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm
- Distributed Crypto-computing
- Efficient Polynomial Operations in the Shared-Coefficients Setting
- Generic On-Line/Off-Line Threshold Signatures
- Linear Integer Secret Sharing and Distributed Exponentiation
- Encryption Methods
- Encoding-Free ElGamal Encryption Without Random Oracles
- Parallel Key-Insulated Public Key Encryption
- Provably Secure Steganography with Imperfect Sampling
- Cryptographic Hash and Applications
- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited
- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
- Number Theory Algorithms
- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve
- Efficient Scalar Multiplication by Isogeny Decompositions
- Curve25519: New Diffie-Hellman Speed Records
- Pairing-Based Cryptography
- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
- Generalization of the Selective-ID Security Model for HIBE Protocols
- Identity-Based Aggregate Signatures
- On the Limitations of the Spread of an IBE-to-PKE Transformation
- Cryptosystems Design and Analysis
- Inoculating Multivariate Schemes Against Differential Attacks
- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol
- High-Order Attacks Against the Exponent Splitting Protection
- Signature and Identification
- New Online/Offline Signature Schemes Without Random Oracles
- Anonymous Signature Schemes
- The Power of Identification Schemes
- Authentication and Key Establishment
- Security Analysis of KEA Authenticated Key Exchange Protocol
- SAS-Based Authenticated Key Agreement
- The Twist-AUgmented Technique for Key Exchange
- Password-Based Group Key Exchange in a Constant Number of Rounds
- Multi-party Computation
- Conditional Oblivious Cast
- Efficiency Tradeoffs for Malicious Two-Party Computation
- PKI Techniques
- On Constructing Certificateless Cryptosystems from Identity Based Encryption
- Building Better Signcryption Schemes with Tag-KEMs
- Security-Mediated Certificateless Cryptography
- k-Times Anonymous Authentication with a Constant Proving Cost.