Limit search to available items
Book Cover
E-book
Author International Workshop on Practice and Theory in Public Key Cryptography (10th : 2007 : Beijing, China)

Title Public key cryptography : PKC 2007 : 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 : proceedings / Tatsuaki Okamoto, Xiaoyun Wang (eds.)
Published Berlin ; New York : Springer, ©2007

Copies

Description 1 online resource (xiii, 489 pages) : illustrations
Series Lecture notes in computer science, 0302-9743 ; 4450
Lecture notes in computer science ; 4450. 0302-9743
Contents Signatures I -- Full-Domain Subgroup Hiding and Constant-Size Group Signatures -- A Direct Anonymous Attestation Scheme for Embedded Devices -- Anonymous Signatures Made Easy -- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures -- Invited Talk I -- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol -- New Chosen-Ciphertext Attacks on NTRU -- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 -- Protocols I -- Optimistic Fair Exchange in a Multi-user Setting -- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures -- Knowledge-Binding Commitments with Applications in Time-Stamping -- Signatures II -- Efficient Ring Signatures Without Random Oracles -- Traceable Ring Signature -- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles -- Improved On-Line/Off-Line Threshold Signatures -- Multivariate Cryptosystems -- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems -- Cryptanalysis of HFE with Internal Perturbation --?-Invertible Cycles for ultivariate uadratic () Public Key Cryptography -- Encryption -- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman -- Parallel Key-Insulated Public Key Encryption Without Random Oracles -- Multi-bit Cryptosystems Based on Lattice Problems -- Protocols II -- Practical and Secure Solutions for Integer Comparison -- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol -- Identity-Based Traitor Tracing -- Verifiable Shuffle of Large Size Ciphertexts -- Invited Talk II -- A Survey of Single-Database Private Information Retrieval: Techniques and Applications -- Number Theoretic Techniques -- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA -- Efficient Pseudorandom Generators Based on the DDH Assumption -- Fast Batch Verification of Multiple Signatures -- Public-Key Infrastructure -- A Closer Look at PKI: Security and Efficiency -- Self-Generated-Certificate Public Key Encryption Without Pairing
Analysis algoritmen
algorithms
computeranalyse
computer analysis
computers
samenleving
society
informatiesystemen
information systems
computerwetenschappen
computer sciences
computernetwerken
computer networks
gegevensbeheer
data management
Information and Communication Technology (General)
Informatie- en communicatietechnologie (algemeen)
Notes "International Association for Cryptologic Research"--Cover
Bibliography Includes bibliographical references and index
Notes Print version record
Subject Computer security -- Congresses
Computers -- Access control -- Congresses
Data encryption (Computer science) -- Congresses
Public key cryptography -- Congresses
COMPUTERS -- Internet -- Security.
COMPUTERS -- Networking -- Security.
COMPUTERS -- Security -- General.
Informatique.
Computer security
Computers -- Access control
Data encryption (Computer science)
Public key cryptography
Genre/Form proceedings (reports)
Conference papers and proceedings
Conference papers and proceedings.
Actes de congrès.
Form Electronic book
Author Okamoto, Tatsuaki.
Wang, Xiaoyun
International Association for Cryptologic Research.
ISBN 9783540716778
3540716777
3540716769
9783540716761
9786610949151
6610949158
Other Titles PKC 2007
10th International Workshop on Practice and Theory in Public-Key Cryptography
Tenth International Workshop on Practice and Theory in Public-Key Cryptography