Daniel Bleichenbacher (auth.), Hugo Krawczyk (eds.)3540648925, 9783540648925
Table of contents :
Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1….Pages 1-12
A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack….Pages 13-25
Relations among notions of security for public-key encryption schemes….Pages 26-45
Cryptography and the internet….Pages 46-55
Differential collisions in SHA-0….Pages 56-71
From differential cryptanalysis to ciphertext-only attacks….Pages 72-88
A simplified approach to threshold and proactive RSA….Pages 89-104
New efficient and secure protocols for verifiable signature sharing and other applications….Pages 105-120
Trading correctness for privacy in unconditional multi-party computation….Pages 121-136
Fast digital identity revocation….Pages 137-152
Self-delegation with controlled propagation — or — What if you lose your laptop….Pages 153-168
Identity escrow….Pages 169-185
Generalized birthday attacks on unbalanced Feistel networks….Pages 186-199
Quadratic relation of S-box and its application to the linear attack of full round DES….Pages 200-211
Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree….Pages 212-222
Cryptanalysis of the Ajtai-Dwork cryptosystem….Pages 223-242
Cryptanalysis of the Chor-Rivest cryptosystem….Pages 243-256
Cryptanalysis of the oil and vinegar signature scheme….Pages 257-266
From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs….Pages 267-282
Many-to-one trapdoor functions and their relation to public-key cryptosystems….Pages 283-298
Authentication, enhanced security and error correcting codes….Pages 299-303
An efficient discrete log pseudo random generator….Pages 304-317
Fast RSA-type cryptosystem modulo p k q ….Pages 318-326
An elliptic curve implementation of the finite field digital signature algorithm….Pages 327-337
Quantum bit commitment from a physical assumption….Pages 338-353
On concrete security treatment of signatures derived from identification….Pages 354-369
Building PRFs from PRPs….Pages 370-389
Security amplification by composition: The case of doubly-iterated, ideal ciphers….Pages 390-407
On the existence of 3-round zero-knowledge protocols….Pages 408-423
Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?….Pages 424-441
Concurrent zero-knowledge: Reducing the need for timing constraints….Pages 442-457
The solution of McCurley’s discrete log challenge….Pages 458-471
Optimal extension fields for fast arithmetic in public-key algorithms….Pages 472-485
Time-stamping with binary linking schemes….Pages 486-501
Threshold traitor tracing….Pages 502-517
Reviews
There are no reviews yet.