+612 9045 4394
 
CHECKOUT
Advances in Cryptology - Eurocrypt '99 : International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceedings - J. Stern

Advances in Cryptology - Eurocrypt '99

International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceedings

By: J. Stern (Editor)

Paperback

Published: 14th April 1999
Ships: 15 business days
15 business days
$135.51
or 4 easy payments of $33.88 with Learn more

EUROCRYPT '99, the seventeenth annual Eurocrypt Conference, was sp- soredbytheInternationalAssociationforCryptologicResearch(IACR), inco- erationwiththeGroupofCryptologywithintheUnionofCzechMathematicians and Physicists. The GeneralChair, JaroslavHruby, wasresponsiblefor the ov- allorganizationoftheconferenceinthebeautiful cityofPrague. Letmemention that it was a pleasure to work together: although we were in di erent locations, we managed to stay in close contact and maintain a smooth organization of the conference. The Program Committee, consisting of 21 members, considered 120 papers and selected 32 for presentation. In addition, Ross Anderson kindly agreed to chairthetraditionalrumpsessionforinformalshortpresentationsofnewresults. These proceedings include the revised versions of the 32 papers accepted by the Program Committee. These papers were selected on the basis of originality, quality, and relevance to cryptography. As a result, they should give a proper picture of how the eld is evolving. Revisions were not checked and the authors bear full responsibility for the contents of their papers. The selection of papers was a di cult and challenging task. Eachsubmission was refereed by at least three reviewers and most had four reports or more. I wish to thank the program committee members, who did an excellent job. In addition, I gratefully acknowledge the help of a large number of colleagues who reviewed submissions in their areas of expertise.

Cryptanalysis of RSA with Private Key d Less than N[superscript 0.292]p. 1
Differentialsp. 12
Software Performance of Universal Hash Functionsp. 24
Lower Bounds for Oblivious Transfer Reductionsp. 42
On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptionsp. 56
Conditional Oblivious Transfer and Timed-Release Encryptionp. 74
An Efficient Threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attackp. 90
Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primesp. 107
Secure Hash-and-Sign Signatures Without the Random Oraclep. 123
A Note on the Limits of Collusion-Resistant Watermarksp. 140
Coin-Based Anonymous Fingerprintingp. 150
On the Performance of Hyperelliptic Cryptosystemsp. 165
Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristicp. 176
Comparing the MOV and FR Reductions in Elliptic Curve Cryptographyp. 190
Unbalanced Oil and Vinegar Signature Schemesp. 206
Public-Key Cryptosystems Based on Composite Degree Residuosity Classesp. 223
New Public Key Cryptosystems Based on the Dependent-RSA Problemsp. 239
Resistance Against General Iterated Attacksp. 255
XOR and Non-XOR Differential Probabilitiesp. 272
S-boxes with Controllable Nonlinearityp. 286
Secure Distributed Key Generation for Discrete-Log Based Cryptosystemsp. 295
Efficient Multiparty Computations Secure Against an Adaptive Adversaryp. 311
Distributed Pseudo-random Functions and KDCsp. 327
Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codesp. 347
Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problemp. 363
An Analysis of Exponentiation Based on Formal Languagesp. 375
Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Keyp. 389
Computationally Private Information Retrieval with Polylogarithmic Communicationp. 402
On the Concurrent Composition of Zero-Knowledge Proofsp. 415
Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applicationsp. 432
Secure Communication in Broadcast Channels: The Answer to Franklin and Wright's Questionp. 446
Efficient Communication-Storage Tradeoffs for Multicast Encryptionp. 459
Author Indexp. 475
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540658894
ISBN-10: 3540658890
Series: Lecture Notes in Computer Science,
Audience: General
Format: Paperback
Language: English
Number Of Pages: 480
Published: 14th April 1999
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 2.57
Weight (kg): 0.69