Public Key Cryptography - PKC 2007 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2007.
|
Edición: | 1st ed. 2007. |
Colección: | Security and Cryptology ;
4450 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Signatures I
- Full-Domain Subgroup Hiding and Constant-Size Group Signatures
- A Direct Anonymous Attestation Scheme for Embedded Devices
- Anonymous Signatures Made Easy
- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures
- Invited Talk I
- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions
- Cryptanalysis
- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol
- New Chosen-Ciphertext Attacks on NTRU
- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003
- Protocols I
- Optimistic Fair Exchange in a Multi-user Setting
- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures
- Knowledge-Binding Commitments with Applications in Time-Stamping
- Signatures II
- Efficient Ring Signatures Without Random Oracles
- Traceable Ring Signature
- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles
- Improved On-Line/Off-Line Threshold Signatures
- Multivariate Cryptosystems
- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems
- Cryptanalysis of HFE with Internal Perturbation
- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography
- Encryption
- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman
- Parallel Key-Insulated Public Key Encryption Without Random Oracles
- Multi-bit Cryptosystems Based on Lattice Problems
- Protocols II
- Practical and Secure Solutions for Integer Comparison
- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
- Identity-Based Traitor Tracing
- Verifiable Shuffle of Large Size Ciphertexts
- Invited Talk II
- A Survey of Single-Database Private Information Retrieval: Techniques and Applications
- Number Theoretic Techniques
- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA
- Efficient Pseudorandom Generators Based on the DDH Assumption
- Fast Batch Verification of Multiple Signatures
- Public-Key Infrastructure
- A Closer Look at PKI: Security and Efficiency
- Self-Generated-Certificate Public Key Encryption Without Pairing.