Don Coppersmith, Matthew Franklin, Jacques Patarin, Michael Reiter (auth.), Ueli Maurer (eds.)354061186X, 9783540611868
Table of contents :
Low-Exponent RSA with Related Messages….Pages 1-9
Generating EIGamal Signatures Without Knowing the Secret Key….Pages 10-18
On the Security of Two MAC Algorithms….Pages 19-32
Hidden Fields Equations (HFE) and Isomorphisms of Polynomials (IP): Two New Families of Asymmetric Algorithms….Pages 33-48
A Public Key Cryptosystem Based on Elliptic Curves over ℤ/ n ℤ Equivalent to Factoring….Pages 49-59
Public Key Encryption and Signature Schemes Based on Polynomials over ℤ n ….Pages 60-71
Multi-Authority Secret-Ballot Elections with Linear Work….Pages 72-83
Asymmetric Fingerprinting….Pages 84-95
Homomorphisms of Secret Sharing Schemes: A Tool for Verifiable Signature Sharing….Pages 96-106
Efficient Multiplicative Sharing Schemes….Pages 107-118
Equivocable Oblivious Transfer….Pages 119-130
Short Discreet Proofs….Pages 131-142
Designated Verifier Proofs and Their Applications….Pages 143-154
Finding a Small Root of a Univariate Modular Equation….Pages 155-165
New Modular Multiplication Algorithms for Fast Modular Exponentiation….Pages 166-177
Finding a Small Root of a Bivariate Integer Equation; Factoring with High Bits Known….Pages 178-189
Publicly Verifiable Secret Sharing….Pages 190-199
Optimum Secret Sharing Scheme Secure against Cheating….Pages 200-211
The Security of the Gabidulin Public Key Cryptosystem….Pages 212-223
Non-Linear Approximations in Linear Cryptanalysis….Pages 224-236
On the Difficulty of Software Key Escrow….Pages 237-244
An Efficient Pseudo-Random Generator Provably as Secure as Syndrome Decoding….Pages 245-255
On the Existence of Secure Feedback Registers….Pages 256-267
Fast Low Order Approximation of Cryptographic Functions….Pages 268-282
Construction of t -Resilient Functions over a Finite Alphabet….Pages 283-293
Auto-Correlations and New Bounds on the Nonlinearity of Boolean Functions….Pages 294-306
Foiling Birthday Attacks in Length-Doubling Transformations….Pages 307-320
Session Key Distribution Using Smart Cards….Pages 321-331
On Diffie-Hellman Key Agreement with Short Exponents….Pages 332-343
On the Security of a Practical Identification Scheme….Pages 344-353
Robust Threshold DSS Signatures….Pages 354-371
New Convertible Undeniable Signature Schemes….Pages 372-386
Security Proofs for Signature Schemes….Pages 387-398
The Exact Security of Digital Signatures-How to Sign with RSA and Rabin….Pages 399-416
Reviews
There are no reviews yet.