Public Key Cryptography - PKC 2006
Springer Berlin (Verlag)
978-3-540-33851-2 (ISBN)
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
Cryptanalysis and Protocol Weaknesses.- New Attacks on RSA with Small Secret CRT-Exponents.- An Attack on a Modified Niederreiter Encryption Scheme.- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.- Distributed Crypto-computing.- Efficient Polynomial Operations in the Shared-Coefficients Setting.- Generic On-Line/Off-Line Threshold Signatures.- Linear Integer Secret Sharing and Distributed Exponentiation.- Encryption Methods.- Encoding-Free ElGamal Encryption Without Random Oracles.- Parallel Key-Insulated Public Key Encryption.- Provably Secure Steganography with Imperfect Sampling.- Cryptographic Hash and Applications.- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.- Number Theory Algorithms.- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve.- Efficient Scalar Multiplication by Isogeny Decompositions.- Curve25519: New Diffie-Hellman Speed Records.- Pairing-Based Cryptography.- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.- Generalization of the Selective-ID Security Model for HIBE Protocols.- Identity-Based Aggregate Signatures.- On the Limitations of the Spread of an IBE-to-PKE Transformation.- Cryptosystems Design and Analysis.- Inoculating Multivariate Schemes Against Differential Attacks.- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.- High-Order Attacks Against the Exponent Splitting Protection.- Signature and Identification.- New Online/Offline Signature Schemes Without Random Oracles.- Anonymous Signature Schemes.- The Power of Identification Schemes.- Authentication and Key Establishment.- Security Analysis of KEA Authenticated Key Exchange Protocol.- SAS-Based Authenticated Key Agreement.- The Twist-AUgmented Technique for Key Exchange.- Password-Based Group Key Exchange in a Constant Number of Rounds.- Multi-party Computation.- Conditional Oblivious Cast.- Efficiency Tradeoffs for Malicious Two-Party Computation.- PKI Techniques.- On Constructing Certificateless Cryptosystems from Identity Based Encryption.- Building Better Signcryption Schemes with Tag-KEMs.- Security-Mediated Certificateless Cryptography.- k-Times Anonymous Authentication with a Constant Proving Cost.
Erscheint lt. Verlag | 18.4.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 543 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1720 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • Cryptanalysis • cryptographic algorithms • cryptography • DES • digital signature schemes • distributed crypto-computing • encryption methods • group key exchange • identity-based encryption • PKI techniques • Public Key Cryptography • Public Key Cryptosystems • public key encryption • RSA attack • RSA attacks • signcryption |
ISBN-10 | 3-540-33851-9 / 3540338519 |
ISBN-13 | 978-3-540-33851-2 / 9783540338512 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich