Get Free Shipping on orders over $79
Public Key Cryptography : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 Proceedings - Pascal Pallier

Public Key Cryptography

5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 Proceedings

By: Pascal Pallier, David Naccache, Pascal Paillier (Editor)

Paperback

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

JulienBrouchier- servesspecialthanksforskillfullymaintainingtheprogramcommittee'swebsite andpatientlyhelpingoutduringtherefereeingprocess. Finally,wewishtothankalltheauthorswhocommittedtheirtimebys- mitting papers (including those whose submissions were not successful), thus makingthisconferencepossible,aswellastheparticipants,organizers,andc- tributorsfromaroundtheworldfortheirkindsupport. December2001 DavidNaccache,PascalPaillier PKC2002 FifthInternationalWorkshop onPracticeandTheory inPublicKeyCryptography MaisondelaChimie,Paris,France February12-14,2002 ProgramCommittee DavidNaccache(ProgramChair). . . . . . . . . . . . . . . . . . . . . . . . . . . . Gemplus,France DanielBleichenbacher. . . . . . . . . . . . . . . . . . . BellLabs,LucentTechnologies,USA YvoDesmedt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FloridaStateUniversity,USA MarcFischlin. . . . . . . . . . . . . . . . . . . . . . . Goethe-UniversityofFrankfurt,Germany ShaiHalevi. . . . . . . . . . . . . . . . . . . . . . . . . IBMT. J. WatsonResearchCenter,USA MarkusJakobsson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RSALaboratories,USA AntoineJoux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DCSSI,France BurtKaliski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RSALaboratories,USA KwangjoKim . . . . . . . . . . . . InformationandCommunicationsUniversity,Korea EyalKushilevitz. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Technion,Israel PascalPaillier. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Gemplus,France ´ DavidPointcheval . . . . . . . . . . . . . . . . . . . . . . . . . . EcoleNormaleSup´erieure,France Jean-JacquesQuisquater. . . . . . . . . . Universit´eCatholiquedeLouvain,Belgium PhillipRogaway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UCDavis,USA KazueSako. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NECCorporation,Japan BruceSchneier. . . . . . . . . . . . . . . . . . . . . . . . . . . CounterpaneInternetSecurity,USA JunjiShikata. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UniversityofTokyo,Japan IgorShparlinski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MacquarieUniversity,Australia MotiYung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Certco,USA JianyingZhou. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OracleCorporation,USA TableofContents EncryptionSchemes NewSemanticallySecurePublic-KeyCryptosystemsfromtheRSA-Primitive 1 KouichiSakurai(KyushuUniversity,Japan),TsuyoshiTakagi (TechnischeUniversit¨ atDarmstadt,Germany) OptimalChosen-CiphertextSecureEncryption ofArbitrary-LengthMessages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Jean-S´ ebastien Coron (Gemplus, France), Helena Handschuh (Gemplus,France),MarcJoye(Gemplus,France),PascalPaillier ´ (Gemplus,France),DavidPointcheval(EcoleNormaleSup´ erieure,France), ChristopheTymen(Gemplus,France) OnSu?cientRandomnessforSecurePublic-KeyCryptosystems. . . . . . . . . 34 Takeshi Koshiba (Fujitsu Laboratories Ltd, Japan) Multi-recipientPublic-KeyEncryptionwithShortenedCiphertext. . . . . . . . 48 Kaoru Kurosawa (Ibaraki University, Japan) SignatureSchemes E?cientandUnconditionallySecureDigitalSignatures andaSecurityAnalysisofaMultireceiverAuthenticationCode. . . . . . . . . . 64 GoichiroHanaoka(UniversityofTokyo,Japan),JunjiShikata (University of Tokyo, Japan), Yuliang Zheng (UNC Charlotte, USA), HidekiImai(UniversityofTokyo,Japan) FormalProofsfortheSecurityofSigncryption. . . . . . . . . . . . . . . . . . . . . . . . . 80 JoonsangBaek(MonashUniversity,Australia),RonSteinfeld(Monash University,Australia),YuliangZheng(UN

More in Data Encryption

Secure and Smart Cyber-Physical Systems - Danda B Rawat
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF
Linux Security Cookbook : Cookbooks Ser. - Daniel J Barrett

RRP $76.00

$39.75

48%
OFF