Cargando…

Progress in Cryptology - VIETCRYPT 2006 First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers /

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: SpringerLink (Online service)
Otros Autores: Nguyen, Phong Q. (Editor )
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2006.
Edición:1st ed. 2006.
Colección:Security and Cryptology ; 4341
Temas:
Acceso en línea:Texto Completo
Tabla de Contenidos:
  • Signatures and Lightweight Cryptography
  • Probabilistic Multivariate Cryptography
  • Short 2-Move Undeniable Signatures
  • Searching for Compact Algorithms: cgen
  • Invited Talk
  • On Pairing-Based Cryptosystems
  • Pairing-Based Cryptography
  • A New Signature Scheme Without Random Oracles from Bilinear Pairings
  • Efficient Dynamic k-Times Anonymous Authentication
  • Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?
  • Algorithmic Number Theory
  • Factorization of Square-Free Integers with High Bits Known
  • Scalar Multiplication on Koblitz Curves Using Double Bases
  • Compressed Jacobian Coordinates for OEF
  • Ring Signatures and Group Signatures
  • On the Definition of Anonymity for Ring Signatures
  • Escrowed Linkability of Ring Signatures and Its Applications
  • Dynamic Fully Anonymous Short Group Signatures
  • Hash Functions
  • Formalizing Human Ignorance
  • Discrete Logarithm Variants of VSH
  • How to Construct Sufficient Conditions for Hash Functions
  • Cryptanalysis
  • Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators
  • On the Internal Structure of Alpha-MAC
  • A Weak Key Class of XTEA for a Related-Key Rectangle Attack
  • Key Agreement and Threshold Cryptography
  • Deniable Group Key Agreement
  • An Ideal and Robust Threshold RSA
  • Towards Provably Secure Group Key Agreement Building on Group Theory
  • Public-Key Encryption
  • Universally Composable Identity-Based Encryption
  • Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate
  • Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.