Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.)3540205926, 9783540205920
The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on public key cryptography, number theory, efficient implementations, key management and protocols, hash functions, group signatures, block cyphers, broadcast and multicast, foundations and complexity theory, and digital signatures.
Table of contents :
Front Matter….Pages –
Chosen-Ciphertext Security without Redundancy….Pages 1-18
Some RSA-Based Encryption Schemes with Tight Security Reduction….Pages 19-36
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications….Pages 37-54
Factoring Estimates for a 1024-Bit RSA Modulus….Pages 55-74
Index Calculus Attack for Hyperelliptic Curves of Small Genus….Pages 75-92
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves….Pages 93-110
Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p – x + d ….Pages 111-123
The AGM- X 0 ( N ) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting….Pages 124-136
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy….Pages 137-154
Leakage-Resilient Authenticated Key Establishment Protocols….Pages 155-172
Untraceable Fair Network Payment Protocols with Off-Line TTP….Pages 173-187
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking….Pages 188-207
New Parallel Domain Extenders for UOWHF….Pages 208-227
Cryptanalysis of 3-Pass HAVAL….Pages 228-245
Efficient Group Signatures without Trapdoors….Pages 246-268
Accumulating Composites and Improved Group Signing….Pages 269-286
Almost Uniform Density of Power Residues and the Provable Security of ESIGN….Pages 287-301
Rotations and Translations of Number Field Sieve Polynomials….Pages 302-310
On Class Group Computations Using the Number Field Sieve….Pages 311-325
The Secret and Beauty of Ancient Chinese Padlocks….Pages 326-330
A Traceable Block Cipher….Pages 331-346
A New Attack against Khazad….Pages 347-358
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack….Pages 359-373
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes….Pages 374-391
Boneh et al. ’s k -Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption….Pages 392-397
On Diophantine Complexity and Statistical Zero-Knowledge Arguments….Pages 398-415
Verifiable Homomorphic Oblivious Transfer and Private Equality Test….Pages 416-433
Generalized Powering Functions and Their Application to Digital Signatures….Pages 434-451
Certificateless Public Key Cryptography….Pages 452-473
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems….Pages 474-491
The Insecurity of Esign in Practical Implementations….Pages 492-506
Efficient One-Time Proxy Signatures….Pages 507-522
Universal Designated-Verifier Signatures….Pages 523-542
Back Matter….Pages –
Reviews
There are no reviews yet.