HOME > 상세정보

상세정보

Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings

Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings

자료유형
단행본
개인저자
Kim, Kwangjo.
서명 / 저자사항
Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings / Kwangjo Kim (ed.).
발행사항
Berlin ;   New York :   Springer,   c2001.  
형태사항
xi, 421 p. : ill. ; 23 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 1992
ISBN
3540416587 (pbk. : alk. paper) 9783540416586 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Computers -- Access control -- Congresses. Data encryption (Computer science) -- Congresses. Public key cryptography -- Congresses.
000 02010camuu2200433 a 4500
001 000045560698
005 20091125143630
008 010122s2001 gw a b 101 0 eng
010 ▼a 2001018889
020 ▼a 3540416587 (pbk. : alk. paper)
020 ▼a 9783540416586 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm45835537
035 ▼a (OCoLC)45835537
035 ▼a (KERIS)REF000014897489
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I567 2001
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I61p ▼c 2001
111 2 ▼a International Workshop on Practice and Theory in Public Key Cryptography ▼n (4th : ▼n 2001 : ▼c Cheju Island, Korea)
245 1 0 ▼a Public key cryptography : ▼b 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001 : proceedings / ▼c Kwangjo Kim (ed.).
246 3 0 ▼a PKC 2001
246 3 0 ▼a 4th International Workshop on Practice and Theory in Public Key Cryptosystems
246 3 ▼a Fourth International Workshop on Practice and Theory in Public Key Cryptosystems
246 3 0 ▼a International Workshop on Practice and Theory in Public Key Cryptosystems
246 3 0 ▼a Practice and Theory in Public Key Cryptosystems
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2001.
300 ▼a xi, 421 p. : ▼b ill. ; ▼c 23 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 1992
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computers ▼x Access control ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Public key cryptography ▼v Congresses.
700 1 ▼a Kim, Kwangjo.
830 0 ▼a Lecture notes in computer science ; ▼v 1992.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I61p 2001 등록번호 121186603 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

On the Security o a Williams Based Public Key Encryption Scheme.- Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC -.- IND-CCA Public Key Schemes Equivalent to Factoring n =pq.- Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite.- On the Security o Lenstra' s Variant o DSA without Long Inversions.- Fast Irreducibility and Subgroup Membership Testing in XTR.- A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes.- The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes.- A Generalisation, a Simpli.cation and Some Applications of Paillier's Probabilistic Public-Key System.- Marking: A Privacy Protecting Approach Against Blackmailing.- Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems.- Cryptanalysis of PKP: A New Approach.- Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures.- Loopholes in Two Public Key Cryptosystems Using the Modular Group.- Efficient Revocation in Group Signatures.- A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares.- Efficient Asymmetric Self-Enforcement Scheme with Public Traceability.- Adaptive Security for the Additive-Sharing Based Proactive RSA.- Robust Forward-Secure Signature Schemes with Proactive Security.- Equitability in Retroactive Data Confiscation versus Proactive Key Escrow.- A PVSS as Hard as Discrete Log and Shareholder Separability.- One Round Threshold Discrete-Log Key Generation without Private Channels.- Remarks on Mix-Network Based on Permutation Networks.- New Key Recovery in WAKE Protocol.- Redundant Representation of Finite Fields.- Compact Encoding of Non-adjacent Forms with Applications to Elliptic Curve Cryptography.- Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP430x33x Family of Microcontrollers.- Secure Server-Aided Signature Generation.- Efficient Long-Term Validation of Digital Signatures.- A Novel Systolic Architecture for an Efficient RSA Implementation.


정보제공 : Aladin

관련분야 신착자료