HOME > 상세정보

상세정보

Public key cryptography--PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings

Public key cryptography--PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings

자료유형
단행본
개인저자
Vaudenay, Serge.
서명 / 저자사항
Public key cryptography--PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / Serge Vaudenay (ed.).
발행사항
Berlin ;   New York :   Springer,   c2005.  
형태사항
xiii, 431 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 3386
ISBN
3540244549 (pbk. : alk. paper) 9783540224547 (pbk. : alk. paper)
일반주기
Also issued online.
서지주기
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
일반주제명
Computer security -- Congresses. Computers -- Access control -- Congresses. Data encryption (Computer science) -- Congresses. Public key cryptography -- Congresses.
000 02304camuu2200481 a 4500
001 000045560892
005 20091125142153
008 041213s2005 gw a b 101 0 eng c
010 ▼a 2004117654
020 ▼a 3540244549 (pbk. : alk. paper)
020 ▼a 9783540224547 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm57541090
035 ▼a (OCoLC)57541090
035 ▼a (KERIS)REF000011455021
040 ▼a OHX ▼c OHX ▼d CUS ▼d C$Q ▼d OCLCQ ▼d IQU ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I575 2005
072 7 ▼a QA ▼2 lcco
082 0 0 ▼a 005.8 ▼2 22
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I61p ▼c 2005
111 2 ▼a International Workshop on Theory and Practice in Public Key Cryptography ▼n (8th : ▼d 2005 : ▼c Les Diablerets, Switzerland)
245 1 0 ▼a Public key cryptography--PKC 2005 : ▼b 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings / ▼c Serge Vaudenay (ed.).
246 3 0 ▼a PKC 2005
246 3 0 ▼a 8th International Workshop on Theory and Practice in Public Key Cryptography
246 3 0 ▼a Eighth International Workshop on Theory and Practice in Public Key Cryptography
246 3 0 ▼a International Workshop on Theory and Practice in Public Key Cryptography
246 3 0 ▼a Theory and practice in public key cryptography
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xiii, 431 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3386
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Computers ▼x Access control ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼v Congresses.
650 0 ▼a Public key cryptography ▼v Congresses.
700 1 ▼a Vaudenay, Serge.
830 0 ▼a Lecture notes in computer science ; ▼v 3386.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I61p 2005 등록번호 121186548 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Cryptanalysis.- A New Related Message Attack on RSA.- Breaking a Cryptographic Protocol with Pseudoprimes.- Experimenting with Faults, Lattices and the DSA.- Key Establishment.- Securing RSA-KEM via the AES.- One-Time Verifier-Based Encrypted Key Exchange.- Password-Based Authenticated Key Exchange in the Three-Party Setting.- Optimization.- On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods.- Symmetric Subgroup Membership Problems.- Building Blocks.- Optimizing Robustness While Generating Shared Secret Safe Primes.- Fast Multi-computations with Integer Similarity Strategy.- Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order.- Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries.- RSA Cryptography.- Converse Results to the Wiener Attack on RSA.- RSA with Balanced Short Exponents and Its Application to Entity Authentication.- The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity.- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited.- Multivariate Asymmetric Cryptography.- Tractable Rational Map Signature.- Cryptanalysis of the Tractable Rational Map Cryptosystem.- Large Superfluous Keys in ultivariate uadratic Asymmetric Systems.- Cryptanalysis of HFEv and Internal Perturbation of HFE.- Signature Schemes.- A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible.- Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring.- The Security of the FDH Variant of Chaum's Undeniable Signature Scheme.- Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions.- Identity-Based Cryptography.- Improved Identity-Based Signcryption.- Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption.- CBE from CL-PKE: A Generic Construction and Efficient Schemes.- Best Paper Award.- A Verifiable Random Function with Short Proofs and Keys.


정보제공 : Aladin

관련분야 신착자료