Coverart for item
The Resource Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings, Kwangjo Kim (ed.)

Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings, Kwangjo Kim (ed.)

Label
Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings
Title
Public key cryptography
Title remainder
4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings
Statement of responsibility
Kwangjo Kim (ed.)
Title variation
PKC 2001
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
DLC
Dewey number
005.8/2
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I567 2001
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2001
http://bibfra.me/vocab/lite/meetingName
International Workshop on Practice and Theory in Public Key Cryptography
Nature of contents
bibliography
http://library.link/vocab/relatedWorkOrContributorName
Kim, Kwangjo
Series statement
Lecture notes in computer science,
Series volume
1992
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Data encryption (Computer science)
  • Public key cryptography
Label
Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings, Kwangjo Kim (ed.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • On the security of lenstra's variant of DSA without long inversions
  • Arjen K. Lenstra and Igor E. Shparlinski
  • Fast irreducibility and subgroup membership testing in XTR
  • Arjen K. Lenstra and Eric R. Verheul
  • New aspect for security notions: secure randomness in public key encryption schemes
  • Takeshi Koshiba
  • Gap-problems: a new class of problems for the security of cryptographic schemes
  • Tatsuaki Okamoto and David Pointcheval
  • Generalisation, a simplification and some applications of paillier;s probabilistic public key system
  • Ivan Damgård and Mads Jurik
  • On the security of a Williams based public key encryption scheme
  • Marking: a privacy protecting approach against blackmailing
  • Dennis Kügler and Holger Vogt
  • Cryptanalysis of two sparse polynomial based public key cryptosystems
  • Feng Bao ... [et al.]
  • Cryptanalysis of PKP: a new approach
  • Éliane Jaulmes and Antoine Joux
  • Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructures
  • Hongjun Wu ... [et al.]
  • Loopholes in two public key cryptosystems using the modular group
  • Rainer Steinwandt
  • Siguna Müller
  • Efficent revocation in group signatures
  • Emmanuel Bresson and Jacques Stern
  • Public-key traitor tracing scheme with revocatuib using dynamic shares
  • Wen-Guey Tzeng and Zhi-Jia Tzeng
  • Efficient asymmetric self-enforcement scheme with public traceability
  • Hirotaka Komaki ... [et al.]
  • Adaptive security for the additive_sharing based proactive RSA
  • Yair Frankel, Philip D. MacKenzie, and Moti Yung
  • Robust forward-secure signature schemes with proactive security
  • Wen-Guey Tzeng and Zhi-Jia Tzeng
  • Semantically secure McEliece, public-key cryptosystems-conversions for McEliece PKC
  • Equitability in retroactive data confiscation versus proactive key escrow
  • Yvo Desmedt, Mike Burmester and Jennifer Seberry
  • PVSS as hard as discrete log and shareholder separability
  • Adam Young
  • One round threshold discrete-log key generation without private channels
  • Pierre-Alain Fouque and Jacques Stern
  • Remarks on mix-network based on permutation networks
  • Masayuki Abe and Fumitaka Hoshino
  • New key recovery in WAKE protocol
  • Chong Hee Kim and Pil Joong Lee
  • Kazukuni Kobara and Hideki Imai
  • Redundant representation of finite fields
  • Willi Geiselmann and Harald Lukhaub
  • Compact enccoding of non-adjacent forms with applications to elliptic curve cryptography
  • Marc Joye and Christophe Tymen
  • Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers
  • Jorge Guajardo ... [et al.]
  • Secure server-aided signature generation
  • Markus Jakobsson and Susanne Wetzel
  • Efficient long-term validation of digital signatures
  • Arne Ansper ... [et al.]
  • IND-CCA public key schemes equivalent to factoring n=pq
  • Novel systolic architecture for an efficient RSA implementation
  • Nikos K. Moshopoulos and K.Z. Pekmestzi
  • Kaoru Kurosawa ... [et al.]
  • Identification, signature and signcryption using high order residues modulo an RSA composite
  • Yulian Zheng
Control code
45835537
Dimensions
24 cm
Extent
xi, 421 pages
Isbn
9783540416586
Isbn Type
(softcover)
Lccn
2001018889
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations
Label
Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings, Kwangjo Kim (ed.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
volume
Carrier category code
  • nc
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • On the security of lenstra's variant of DSA without long inversions
  • Arjen K. Lenstra and Igor E. Shparlinski
  • Fast irreducibility and subgroup membership testing in XTR
  • Arjen K. Lenstra and Eric R. Verheul
  • New aspect for security notions: secure randomness in public key encryption schemes
  • Takeshi Koshiba
  • Gap-problems: a new class of problems for the security of cryptographic schemes
  • Tatsuaki Okamoto and David Pointcheval
  • Generalisation, a simplification and some applications of paillier;s probabilistic public key system
  • Ivan Damgård and Mads Jurik
  • On the security of a Williams based public key encryption scheme
  • Marking: a privacy protecting approach against blackmailing
  • Dennis Kügler and Holger Vogt
  • Cryptanalysis of two sparse polynomial based public key cryptosystems
  • Feng Bao ... [et al.]
  • Cryptanalysis of PKP: a new approach
  • Éliane Jaulmes and Antoine Joux
  • Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructures
  • Hongjun Wu ... [et al.]
  • Loopholes in two public key cryptosystems using the modular group
  • Rainer Steinwandt
  • Siguna Müller
  • Efficent revocation in group signatures
  • Emmanuel Bresson and Jacques Stern
  • Public-key traitor tracing scheme with revocatuib using dynamic shares
  • Wen-Guey Tzeng and Zhi-Jia Tzeng
  • Efficient asymmetric self-enforcement scheme with public traceability
  • Hirotaka Komaki ... [et al.]
  • Adaptive security for the additive_sharing based proactive RSA
  • Yair Frankel, Philip D. MacKenzie, and Moti Yung
  • Robust forward-secure signature schemes with proactive security
  • Wen-Guey Tzeng and Zhi-Jia Tzeng
  • Semantically secure McEliece, public-key cryptosystems-conversions for McEliece PKC
  • Equitability in retroactive data confiscation versus proactive key escrow
  • Yvo Desmedt, Mike Burmester and Jennifer Seberry
  • PVSS as hard as discrete log and shareholder separability
  • Adam Young
  • One round threshold discrete-log key generation without private channels
  • Pierre-Alain Fouque and Jacques Stern
  • Remarks on mix-network based on permutation networks
  • Masayuki Abe and Fumitaka Hoshino
  • New key recovery in WAKE protocol
  • Chong Hee Kim and Pil Joong Lee
  • Kazukuni Kobara and Hideki Imai
  • Redundant representation of finite fields
  • Willi Geiselmann and Harald Lukhaub
  • Compact enccoding of non-adjacent forms with applications to elliptic curve cryptography
  • Marc Joye and Christophe Tymen
  • Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers
  • Jorge Guajardo ... [et al.]
  • Secure server-aided signature generation
  • Markus Jakobsson and Susanne Wetzel
  • Efficient long-term validation of digital signatures
  • Arne Ansper ... [et al.]
  • IND-CCA public key schemes equivalent to factoring n=pq
  • Novel systolic architecture for an efficient RSA implementation
  • Nikos K. Moshopoulos and K.Z. Pekmestzi
  • Kaoru Kurosawa ... [et al.]
  • Identification, signature and signcryption using high order residues modulo an RSA composite
  • Yulian Zheng
Control code
45835537
Dimensions
24 cm
Extent
xi, 421 pages
Isbn
9783540416586
Isbn Type
(softcover)
Lccn
2001018889
Media category
unmediated
Media MARC source
rdamedia
Media type code
  • n
Other physical details
illustrations

Library Locations

    • Thomas Jefferson LibraryBorrow it
      1 University Blvd, St. Louis, MO, 63121, US
      38.710138 -90.311107
Processing Feedback ...