+612 9045 4394
 
CHECKOUT
Public Key Cryptography -- Pkc 2004 : 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 - Feng Bao

Public Key Cryptography -- Pkc 2004

7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004

By: Feng Bao (Editor), Robert Deng (Editor), Jianying Zhou (Editor)

Paperback

Published: 1st March 2004
Ships: 15 business days
15 business days
$158.39
or 4 easy payments of $39.60 with Learn more

PKC2004wasthe7thInternationalWorkshoponPracticeandTheoryinPublic Key Cryptography and was sponsored by IACR, the International Association for Cryptologic Research (www. iacr. org). This year the workshop was organized 2 in cooperation with the Institute for Infocomm Research (I R), Singapore. There were 106 paper submissions from 19 countries to PKC 2004. That is the highest submission number in PKC history. Due to the large number of submissionsandthehighqualityofthe submittedpapers, notallthepapersthat contained new ideas were accepted. Of the 106 submissions, 32 were selected for the proceedings. Each paper was sent to at least 3 members of the Program Committee for comments. The revised versions of the accepted papers were not checked for correctness of their scienti?c aspects and the authors bear the full responsibility for the contents of their papers. Some authors will write ?nal versions of their papers for publication in refereed journals. I am very grateful to the members of the Program Committee for their hard work in the di?cult task of selecting fewer than 1 in 3 of the submitted papers, as well as the following external referees who helped the Program Committee: Nuttapong Attrapadung, RobertoMariaAvanzi, GildasAvoine, JoonsangBaek, Qingjun Cai, Jae Choon Cha, Chien-Ning Chen, Liqun Chen, Xiaofeng Chen, Koji Chida, Nicolas T. Courtois, Yang Cui, Jean-Franco, is Dhem, Louis Goubin, Louis Granboulan, Rob Granger, Jens Groth, Yumiko Hanaoka, Darrel Hank- son, Chao-ChihHsu, TetsutaroKobayashi, YuichiKomano, HidenoriKuwakado, TanjaLange, PeterLeadbitter, ByoungcheonLee, Chun-KoLee, HenryC. J. Lee, JohnMaloneLee, YongLi, Beno DEGREES ?tLibert, Hsi-ChungLin, YiLu, JeanMonnerat, Anderson C. A. Nascimento, C.

A generalized Wiener attack on RSAp. 1
Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problemp. 14
Faster scalar multiplication on Koblitz curves combining point halving with the Frobenius endomorphismp. 28
Application of Montgomery's trick to scalar multiplication for elliptic and hyperelliptic curves using a fixed base pointp. 41
Fast arithmetic on Jacobians of Picard curvesp. 55
Undeniable signatures based on characters : how to sign with one bitp. 69
Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signaturesp. 86
Constructing committed signatures from strong-RSA assumption in the standard complexity modelp. 101
Constant round authenticated group key agreement via distributed computationp. 115
Efficient ID-based group key agreement with bilinear mapsp. 130
New security results on encrypted key exchangep. 145
New results on the hardness of Diffie-Hellman bitsp. 159
Short exponent Diffie-Hellman problemsp. 173
Efficient signcryption with key privacy from gap Diffie-Hellman groupsp. 187
Algebraic attacks over GF(2[superscript k]), application to HFE Challenge 2 and Sflash-v2p. 201
Secret exponent attacks on RSA-type schemes with moduli N = p[superscript r]qp. 218
General group authentication codes and their relation to "unconditionally-secure signatures"p. 231
From digital signature to ID-based identification/signaturep. 248
Identity-based threshold decryptionp. 262
An efficient signature scheme from bilinear pairings and its applicationsp. 277
An RSA family of trap-door permutations with a common domain and its applicationsp. 291
A new variant of the Matsumoto-Imai cryptosystem through perturbationp. 305
Efficient, verifiable shuffle decryption and its requirement of unlinkabilityp. 319
A point compression method for elliptic curves defined over GF(2[superscript n])p. 333
On the optimal parameter choice for elliptic curve cryptosystems using isogenyp. 346
On the security of multiple encryption or CCA-security+CCA-security=CCA-security?p. 360
QuasiModo : efficient certificate validation and revocationp. 375
A distributed online certificate status protocol with a single public keyp. 389
A first approach to provide anonymity in attribute certificatesp. 402
A nonuniform algorithm for the hidden number problem in subgroupsp. 416
Cryptographic randomized response techniquesp. 425
A correct, private, and efficient mix networkp. 439
Author Indexp. 455
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540210184
ISBN-10: 3540210180
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 454
Published: 1st March 2004
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.52 x 16.05  x 2.72
Weight (kg): 0.69