Advances in Cryptology — ASIACRYPT’98
Springer Berlin (Verlag)
978-3-540-65109-3 (ISBN)
Public Key Cryptosystems.- Generating RSA Moduli with a Predetermined Portion.- Generation of Shared RSA Keys by Two Parties.- An Attack on RSA Given a Small Fraction of the Private Key Bits.- C ?+ * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.- Invited Talk.- ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture).- Elliptic Curve Cryptosystems.- Efficient Elliptic Curve Exponentiation Using Mixed Coordinates.- Efficient Implementation of Schoof's Algorithm.- Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 n.- Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings.- Elliptic Curve Discrete Logarithms and the Index Calculus.- Cryptanalysis 1.- Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.- Improved Truncated Differential Attacks on SAFER.- Optimal Resistance Against the Davies and Murphy Attack.- Signature.- A Group Signature Scheme with Improved Efficiency (Extended Abstract).- A Study on the Proposed Korean Digital Signature Algorithm.- Cryptanlysis 2.- Cryptanalysis of the Original McEliece Cryptosystem.- Improving the Security of the McEliece Public-Key Cryptosystem.- Cryptanalysis in Prime Order Subgroups of Z n * .- Finite Automata.- Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC.- Authentication Codes.- Bounds and Constructions for Multireceiver Authentication Codes.- Electronic Cash.- Fair Off-Line e-Cash Made Easy.- Off-line Fair Payment Protocols using Convertible Signatures.- Efficient Fair Exchange with Verifiable Confirmation of Signatures.- Adaptively Secure Oblivious Transfer.- Steam Ciphers.- ML-Sequences over Rings Z/(2e): I. Constructions of Nondegenerative ML-Sequences II. Injectivness of CompressionMappings of New Classes.- Analysis Methods for (Alleged) RC4.- Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.- Cryptographic Protocols.- A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol.- The Béguin-Quisquater Server-Aided RSA Protocol from Crypto '95 is not Secure.- Key Escrow.- Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) Extended Abstract.- New Cryptography.- Audio and Optical Cryptography.- Information Theory.- Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement.- Some Bounds and a Construction for Secure Broadcast Encryption.
Erscheint lt. Verlag | 25.9.1998 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 436 p. 2 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 584 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • Automata • Cryptanalyis • Cryptanalysis • Cryptoanalysis • cryptographic protocol • cryptographic protocols • cryptography • Cryptology • Cryptosystems • digital signature • Digital Signatures • digital signature scheme • Electronic Cash • HC/Informatik, EDV/Informatik • Information Security • Information Theory • Kryptographie / Kryptologie • Public-Key C • Public-Key Cryptosystems |
ISBN-10 | 3-540-65109-8 / 3540651098 |
ISBN-13 | 978-3-540-65109-3 / 9783540651093 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich