+612 9045 4394
 
CHECKOUT
Advances in Cryptology - ASIACRYPT '98 : International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October, 1998 : Lecture Notes in Computer Science - Kazuo Ohta

Advances in Cryptology - ASIACRYPT '98 : International Conference on the Theory and Applications of Cryptology and Information Security, Beijing, China, October, 1998

Lecture Notes in Computer Science

By: Kazuo Ohta (Editor), Dingyi Pei (Editor)

Paperback ISBN: 9783540651093
Number Of Pages: 436

Share This Book:

Paperback

$135.51
or 4 easy payments of $33.88 with Learn more
Ships in 5 to 9 business days

This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT'98, held in Beijing, China, in October 1998.The 32 revised full papers presented were carefully reviewed and selected from a total of 118 submissions. The book is divided in topical sections on public-key cryptosystems, elliptic-curve cryptosystems, cryptanalysis, digital signature schemes, finite automata, authentication codes, electronic cash, stream ciphers, cryptographic protocols, key escrow, new cryptography, and information theory.

Generating RSA Moduli with a Predetermined Portionp. 1
Generation of Shared RSA Keys by Two Partiesp. 11
An Attack on RSA Given a Small Fraction of the Private Key Bitsp. 25
C[subscript +] and HM: Variations Around Two Schemes of T. Matsumoto and H. Imaip. 35
ECC/DLP and Factoring-Based Cryptography: A Tale of Two Familiesp. 50
Efficient Elliptic Curve Exponentiation Using Mixed Coordinatesp. 51
Efficient Implementation of Schoof's Algorithmp. 66
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F[subscript 2][superscript n]p. 80
Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftingsp. 95
Elliptic Curve Discrete Logarithms and the Index Calculusp. 110
Cryptanalysis of Rijmen-Preneel Trapdoor Cipherp. 126
Improved Truncated Differential Attacks on SAFERp. 133
Optimal Resistance Against the Davies and Murphy Attackp. 148
A Group Signature Scheme with Improved Efficiencyp. 160
A Study on the Proposed Korean Digital Signature Algorithmp. 175
Cryptanalysis of the Original McEliece Cryptosystemp. 187
Improving the Security of the McEliece Public-Key Cryptosystemp. 200
Cryptanalysis in Prime Order Subgroups of Z[subscript n]p. 214
Weak Invertibility of Finite Automata and Cryptanalysis on FAPKCp. 227
Bounds and Constructions for Multireceiver Authentication Codesp. 242
Fair Off-Line e-Cash Made Easyp. 257
Off-Line Fair Payment Protocols Using Convertible Signaturesp. 271
Efficient Fair Exchange with Verifiable Confirmation of Signaturesp. 286
Adaptively Secure Oblivious Transferp. 300
ML-Sequences over Rings Z/(2[superscript c])p. 315
Analysis Methods for (Alleged) RC4p. 327
Reduced Complexity Correlation Attacks on Two Clock-Controlled Generatorsp. 342
A New and Efficient All-Or-Nothing Disclosure of Secrets Protocolp. 357
The Beguin-Quisquater Server-Aided RSA Protocol from Crypto'95 Is Not Securep. 372
Equitable Key Escrow with Limited Time Span (or How to Enforce Time Expiration Cryptographically)p. 380
Audio and Optical Cryptographyp. 392
Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreementp. 405
Some Bounds and a Construction for Secure Broadcast Encryptionp. 420
Author Indexp. 435
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540651093
ISBN-10: 3540651098
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 436
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.31
Weight (kg): 0.63