
Public key cryptography--PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings
000 | 02304camuu2200481 a 4500 | |
001 | 000045560892 | |
005 | 20091125142153 | |
008 | 041213s2005 gw a b 101 0 eng c | |
010 | ▼a 2004117654 | |
020 | ▼a 3540244549 (pbk. : alk. paper) | |
020 | ▼a 9783540224547 (pbk. : alk. paper) | |
035 | ▼a (OCoLC)ocm57541090 | |
035 | ▼a (OCoLC)57541090 | |
035 | ▼a (KERIS)REF000011455021 | |
040 | ▼a OHX ▼c OHX ▼d CUS ▼d C$Q ▼d OCLCQ ▼d IQU ▼d DLC ▼d 211009 | |
042 | ▼a pcc | |
050 | 0 0 | ▼a QA76.9.A25 ▼b I575 2005 |
072 | 7 | ▼a QA ▼2 lcco |
082 | 0 0 | ▼a 005.8 ▼2 22 |
082 | 0 4 | ▼a 005.8/2 ▼2 22 |
090 | ▼a 005.82 ▼b I61p ▼c 2005 | |
111 | 2 | ▼a International Workshop on Theory and Practice in Public Key Cryptography ▼n (8th : ▼d 2005 : ▼c Les Diablerets, Switzerland) |
245 | 1 0 | ▼a Public key cryptography--PKC 2005 : ▼b 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / ▼c Serge Vaudenay (ed.). |
246 | 3 0 | ▼a PKC 2005 |
246 | 3 0 | ▼a 8th International Workshop on Theory and Practice in Public Key Cryptography |
246 | 3 0 | ▼a Eighth International Workshop on Theory and Practice in Public Key Cryptography |
246 | 3 0 | ▼a International Workshop on Theory and Practice in Public Key Cryptography |
246 | 3 0 | ▼a Theory and practice in public key cryptography |
260 | ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005. | |
300 | ▼a xiii, 431 p. : ▼b ill. ; ▼c 24 cm. | |
490 | 1 | ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3386 |
504 | ▼a Includes bibliographical references and index. | |
530 | ▼a Also issued online. | |
650 | 0 | ▼a Computer security ▼v Congresses. |
650 | 0 | ▼a Computers ▼x Access control ▼v Congresses. |
650 | 0 | ▼a Data encryption (Computer science) ▼v Congresses. |
650 | 0 | ▼a Public key cryptography ▼v Congresses. |
700 | 1 | ▼a Vaudenay, Serge. |
830 | 0 | ▼a Lecture notes in computer science ; ▼v 3386. |
945 | ▼a KINS |
소장정보
No. | 소장처 | 청구기호 | 등록번호 | 도서상태 | 반납예정일 | 예약 | 서비스 |
---|---|---|---|---|---|---|---|
No. 1 | 소장처 과학도서관/Sci-Info(2층서고)/ | 청구기호 005.82 I61p 2005 | 등록번호 121186548 | 도서상태 대출가능 | 반납예정일 | 예약 | 서비스 |
컨텐츠정보
목차
Cryptanalysis.- A New Related Message Attack on RSA.- Breaking a Cryptographic Protocol with Pseudoprimes.- Experimenting with Faults, Lattices and the DSA.- Key Establishment.- Securing RSA-KEM via the AES.- One-Time Verifier-Based Encrypted Key Exchange.- Password-Based Authenticated Key Exchange in the Three-Party Setting.- Optimization.- On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods.- Symmetric Subgroup Membership Problems.- Building Blocks.- Optimizing Robustness While Generating Shared Secret Safe Primes.- Fast Multi-computations with Integer Similarity Strategy.- Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order.- Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.- RSA Cryptography.- Converse Results to the Wiener Attack on RSA.- RSA with Balanced Short Exponents and Its Application to Entity Authentication.- The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity.- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited.- Multivariate Asymmetric Cryptography.- Tractable Rational Map Signature.- Cryptanalysis of the Tractable Rational Map Cryptosystem.- Large Superfluous Keys in ultivariate uadratic Asymmetric Systems.- Cryptanalysis of HFEv and Internal Perturbation of HFE.- Signature Schemes.- A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible.- Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring.- The Security of the FDH Variant of Chaum's Undeniable Signature Scheme.- Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions.- Identity-Based Cryptography.- Improved Identity-Based Signcryption.- Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.- CBE from CL-PKE: A Generic Construction and Efficient Schemes.- Best Paper Award.- A Verifiable Random Function with Short Proofs and Keys.
정보제공 :
