Daniel Bleichenbacher, Alexander May (auth.), Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkin (eds.)3540338519, 9783540338512
Table of contents :
Front Matter….Pages –
New Attacks on RSA with Small Secret CRT-Exponents….Pages 1-13
An Attack on a Modified Niederreiter Encryption Scheme….Pages 14-26
Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm….Pages 27-43
Efficient Polynomial Operations in the Shared-Coefficients Setting….Pages 44-57
Generic On-Line/Off-Line Threshold Signatures….Pages 58-74
Linear Integer Secret Sharing and Distributed Exponentiation….Pages 75-90
Encoding-Free ElGamal Encryption Without Random Oracles….Pages 91-104
Parallel Key-Insulated Public Key Encryption….Pages 105-122
Provably Secure Steganography with Imperfect Sampling….Pages 123-139
Collision-Resistant No More: Hash-and-Sign Paradigm Revisited….Pages 140-156
Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption….Pages 157-173
An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve….Pages 174-190
Efficient Scalar Multiplication by Isogeny Decompositions….Pages 191-206
Curve25519: New Diffie-Hellman Speed Records….Pages 207-228
Strongly Unforgeable Signatures Based on Computational Diffie-Hellman….Pages 229-240
Generalization of the Selective-ID Security Model for HIBE Protocols….Pages 241-256
Identity-Based Aggregate Signatures….Pages 257-273
On the Limitations of the Spread of an IBE-to-PKE Transformation….Pages 274-289
Inoculating Multivariate Schemes Against Differential Attacks….Pages 290-301
Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol….Pages 302-314
High-Order Attacks Against the Exponent Splitting Protection….Pages 315-329
New Online/Offline Signature Schemes Without Random Oracles….Pages 330-346
Anonymous Signature Schemes….Pages 347-363
The Power of Identification Schemes….Pages 364-377
Security Analysis of KEA Authenticated Key Exchange Protocol….Pages 378-394
SAS-Based Authenticated Key Agreement….Pages 395-409
The Twist-AUgmented Technique for Key Exchange….Pages 410-426
Password-Based Group Key Exchange in a Constant Number of Rounds….Pages 427-442
Conditional Oblivious Cast….Pages 443-457
Efficiency Tradeoffs for Malicious Two-Party Computation….Pages 458-473
On Constructing Certificateless Cryptosystems from Identity Based Encryption….Pages 474-490
Building Better Signcryption Schemes with Tag-KEMs….Pages 491-507
Security-Mediated Certificateless Cryptography….Pages 508-524
k -Times Anonymous Authentication with a Constant Proving Cost….Pages 525-542
Back Matter….Pages –
Reviews
There are no reviews yet.