Public Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings /

Encryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards.

Saved in:
Bibliographic Details
Main Authors: Naccache, David. editor., Paillier, Pascal. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2002
Subjects:Computer science., Computer communication systems., Data encryption (Computer science)., Algorithms., Computer Science., Data Encryption., Algorithm Analysis and Problem Complexity., Computer Communication Networks.,
Online Access:http://dx.doi.org/10.1007/3-540-45664-3
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:170143
record_format koha
spelling KOHA-OAI-TEST:1701432018-07-30T22:46:37ZPublic Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings / Naccache, David. editor. Paillier, Pascal. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2002.engEncryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards.Computer science.Computer communication systems.Data encryption (Computer science).Algorithms.Computer Science.Data Encryption.Algorithm Analysis and Problem Complexity.Computer Communication Networks.Springer eBookshttp://dx.doi.org/10.1007/3-540-45664-3URN:ISBN:9783540456643
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
spellingShingle Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Naccache, David. editor.
Paillier, Pascal. editor.
SpringerLink (Online service)
Public Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings /
description Encryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards.
format Texto
topic_facet Computer science.
Computer communication systems.
Data encryption (Computer science).
Algorithms.
Computer Science.
Data Encryption.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
author Naccache, David. editor.
Paillier, Pascal. editor.
SpringerLink (Online service)
author_facet Naccache, David. editor.
Paillier, Pascal. editor.
SpringerLink (Online service)
author_sort Naccache, David. editor.
title Public Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings /
title_short Public Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings /
title_full Public Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings /
title_fullStr Public Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings /
title_full_unstemmed Public Key Cryptography [electronic resource] : 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings /
title_sort public key cryptography [electronic resource] : 5th international workshop on practice and theory in public key cryptosystems, pkc 2002 paris, france, february 12–14, 2002 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2002
url http://dx.doi.org/10.1007/3-540-45664-3
work_keys_str_mv AT naccachedavideditor publickeycryptographyelectronicresource5thinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2002parisfrancefebruary12142002proceedings
AT paillierpascaleditor publickeycryptographyelectronicresource5thinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2002parisfrancefebruary12142002proceedings
AT springerlinkonlineservice publickeycryptographyelectronicresource5thinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2002parisfrancefebruary12142002proceedings
_version_ 1756263275350196224