Jetzt 20% Rabatt auf alle English Books. Jetzt in über 4 Millionen Büchern stöbern und profitieren!
Willkommen, schön sind Sie da!
Logo Ex Libris

Public Key Cryptography - PKC 2006

  • E-Book (pdf)
  • 543 Seiten
(0) Erste Bewertung abgeben
Alle Bewertungen ansehen
Here are the refereed proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006... Weiterlesen
CHF 94.90
Download steht sofort bereit
Informationen zu E-Books
E-Books eignen sich auch für mobile Geräte (sehen Sie dazu die Anleitungen).
E-Books von Ex Libris sind mit Adobe DRM kopiergeschützt: Erfahren Sie mehr.
Weitere Informationen finden Sie hier.
Bestellung & Lieferung in eine Filiale möglich


Here are the refereed proceedings of the 9th International Conference on Theory and Practice in Public-Key Cryptography, PKC 2006, held in New York City in April 2006. The 34 revised full papers presented are organized in topical sections on cryptanalysis and protocol weaknesses, distributed crypto-computing, encryption methods, cryptographic hash and applications, number theory algorithms, pairing-based cryptography, cryptosystems design and analysis, signature and identification, authentication and key establishment, multi-party computation, and PKI techniques.


Cryptanalysis and Protocol Weaknesses.- New Attacks on RSA with Small Secret CRT-Exponents.- An Attack on a Modified Niederreiter Encryption Scheme.- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.- Distributed Crypto-computing.- Efficient Polynomial Operations in the Shared-Coefficients Setting.- Generic On-Line/Off-Line Threshold Signatures.- Linear Integer Secret Sharing and Distributed Exponentiation.- Encryption Methods.- Encoding-Free ElGamal Encryption Without Random Oracles.- Parallel Key-Insulated Public Key Encryption.- Provably Secure Steganography with Imperfect Sampling.- Cryptographic Hash and Applications.- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.- Number Theory Algorithms.- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve.- Efficient Scalar Multiplication by Isogeny Decompositions.- Curve25519: New Diffie-Hellman Speed Records.- Pairing-Based Cryptography.- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.- Generalization of the Selective-ID Security Model for HIBE Protocols.- Identity-Based Aggregate Signatures.- On the Limitations of the Spread of an IBE-to-PKE Transformation.- Cryptosystems Design and Analysis.- Inoculating Multivariate Schemes Against Differential Attacks.- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.- High-Order Attacks Against the Exponent Splitting Protection.- Signature and Identification.- New Online/Offline Signature Schemes Without Random Oracles.- Anonymous Signature Schemes.- The Power of Identification Schemes.- Authentication and Key Establishment.- Security Analysis of KEA Authenticated Key Exchange Protocol.- SAS-Based Authenticated Key Agreement.- The Twist-AUgmented Technique for Key Exchange.- Password-Based Group Key Exchange in a Constant Number of Rounds.- Multi-party Computation.- Conditional Oblivious Cast.- Efficiency Tradeoffs for Malicious Two-Party Computation.- PKI Techniques.- On Constructing Certificateless Cryptosystems from Identity Based Encryption.- Building Better Signcryption Schemes with Tag-KEMs.- Security-Mediated Certificateless Cryptography.- k-Times Anonymous Authentication with a Constant Proving Cost.


Titel: Public Key Cryptography - PKC 2006
Untertitel: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings
EAN: 9783540338529
Format: E-Book (pdf)
Hersteller: Springer Berlin Heidelberg
Genre: IT & Internet
Veröffentlichung: 14.04.2006
Digitaler Kopierschutz: Wasserzeichen
Dateigrösse: 7.01 MB
Anzahl Seiten: 543

Weitere Bände aus der Buchreihe "Lecture Notes in Computer Science"