Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings

Free Download

Authors:

Edition: 1

Series: Lecture Notes in Computer Science 2274

ISBN: 3540431683, 9783540431688

Size: 3 MB (3079559 bytes)

Pages: 384/393

File format:

Language:

Publishing Year:

Category: Tags: , ,

Kouichi Sakurai, Tsuyoshi Takagi (auth.), David Naccache, Pascal Paillier (eds.)3540431683, 9783540431688

Proceedings of the 4th Intl Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, held February 12-14, 2002 in Paris, France. Among the topics addressed are encryption schemes, signature schemes, protocols, cryptanalysis, elliptic curve cryptography, and side channels. Softcover.

Table of contents :
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive….Pages 1-16
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages….Pages 17-33
On Sufficient Randomness for Secure Public-Key Cryptosystems….Pages 34-47
Multi-recipient Public-Key Encryption with Shortened Ciphertext….Pages 48-63
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code….Pages 64-79
Formal Proofs for the Security of Signcryption….Pages 80-98
A Provably Secure Restrictive Partially Blind Signature Scheme….Pages 99-114
M + 1-st Price Auction Using Homomorphic Encryption….Pages 115-124
Client/Server Tradeoffs for Online Elections….Pages 125-140
Self-tallying Elections and Perfect Ballot Secrecy….Pages 141-158
Efficient 1-Out-n Oblivious Transfer Schemes….Pages 159-171
Linear Code Implies Public-Key Traitor Tracing….Pages 172-187
Design and Security Analysis of Anonymous Group Identification Protocols….Pages 188-198
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem….Pages 199-210
Solving Underdefined Systems of Multivariate Quadratic Equations….Pages 211-227
Selective Forgery of RSA Signatures with Fixed-Pattern Padding….Pages 228-236
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000….Pages 237-251
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation….Pages 252-262
A Combined Timing and Power Attack….Pages 263-279
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks….Pages 280-296
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report….Pages 297-309
An Improved Method of Multiplication on Certain Elliptic Curves….Pages 310-322
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves….Pages 323-334
Weierstraß Elliptic Curves and Side-Channel Attacks….Pages 335-345
One-Way Cross-Trees and Their Applications….Pages 346-356
RSA Key Generation with Verifiable Randomness….Pages 357-374
New Minimal Modified Radix- r Representation with Applications to Smart Cards….Pages 375-383

Reviews

There are no reviews yet.

Be the first to review “Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings”
Shopping Cart
Scroll to Top