Public Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings /

A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol -- An Efficient NICE-Schnorr-Type Signature Scheme -- Identification of Bad Signatures in Batches -- Some Remarks on a Fair Exchange Protocol -- Gaudry’s Variant against C ab Curves -- An Identification Scheme Based on Sparse Polynomials -- A State-Based Model for Certificate Management Systems -- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence -- The Composite Discrete Logarithm and Secure Authentication -- Chosen-Ciphertext Security for Any One-Way Cryptosystem -- Short Proofs of Knowledge for Factoring -- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms -- All-or-Nothing Transform and Remotely Keyed Encryption Protocols -- Security of Public Key Certificate Based Authentication Protocols -- Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2 -- Key Recovery in Third Generation Wireless Communication Systems -- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications -- Certificates of Recoverability with Scalable Recovery Agent Security -- Design Validations for Discrete Logarithm Based Signature Schemes -- Optimally Efficient Accountable Time-Stamping -- “Pseudorandom Intermixing”: A Tool for Shared Cryptography -- RSA-Based Auto-recoverable Cryptosystems -- Efficient and Fresh Certification -- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions -- Cryptographic Approaches to Privacy in Forensic DNA Databases -- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes -- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ) -- An Auction Protocol Which Hides Bids of Losers -- Forward Secrecy and Its Application to Future Mobile Communications Security -- Selecting Cryptographic Key Sizes -- A Structured ElGamal-Type Multisignature Scheme.

Saved in:
Bibliographic Details
Main Authors: Imai, Hideki. editor., Zheng, Yuliang. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 2000
Subjects:Computer science., Computer communication systems., Computer programming., Operating systems (Computers)., Data encryption (Computer science)., Algorithms., Management information systems., Computer Science., Data Encryption., Programming Techniques., Operating Systems., Algorithm Analysis and Problem Complexity., Computer Communication Networks., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/b75033
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:183858
record_format koha
spelling KOHA-OAI-TEST:1838582018-07-30T23:05:15ZPublic Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings / Imai, Hideki. editor. Zheng, Yuliang. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,2000.engA Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol -- An Efficient NICE-Schnorr-Type Signature Scheme -- Identification of Bad Signatures in Batches -- Some Remarks on a Fair Exchange Protocol -- Gaudry’s Variant against C ab Curves -- An Identification Scheme Based on Sparse Polynomials -- A State-Based Model for Certificate Management Systems -- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence -- The Composite Discrete Logarithm and Secure Authentication -- Chosen-Ciphertext Security for Any One-Way Cryptosystem -- Short Proofs of Knowledge for Factoring -- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms -- All-or-Nothing Transform and Remotely Keyed Encryption Protocols -- Security of Public Key Certificate Based Authentication Protocols -- Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2 -- Key Recovery in Third Generation Wireless Communication Systems -- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications -- Certificates of Recoverability with Scalable Recovery Agent Security -- Design Validations for Discrete Logarithm Based Signature Schemes -- Optimally Efficient Accountable Time-Stamping -- “Pseudorandom Intermixing”: A Tool for Shared Cryptography -- RSA-Based Auto-recoverable Cryptosystems -- Efficient and Fresh Certification -- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions -- Cryptographic Approaches to Privacy in Forensic DNA Databases -- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes -- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ) -- An Auction Protocol Which Hides Bids of Losers -- Forward Secrecy and Its Application to Future Mobile Communications Security -- Selecting Cryptographic Key Sizes -- A Structured ElGamal-Type Multisignature Scheme.Computer science.Computer communication systems.Computer programming.Operating systems (Computers).Data encryption (Computer science).Algorithms.Management information systems.Computer Science.Data Encryption.Programming Techniques.Operating Systems.Algorithm Analysis and Problem Complexity.Computer Communication Networks.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/b75033URN:ISBN:9783540465881
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Computer programming.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Programming Techniques.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Computer programming.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Programming Techniques.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
spellingShingle Computer science.
Computer communication systems.
Computer programming.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Programming Techniques.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Computer programming.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Programming Techniques.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
Imai, Hideki. editor.
Zheng, Yuliang. editor.
SpringerLink (Online service)
Public Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings /
description A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol -- An Efficient NICE-Schnorr-Type Signature Scheme -- Identification of Bad Signatures in Batches -- Some Remarks on a Fair Exchange Protocol -- Gaudry’s Variant against C ab Curves -- An Identification Scheme Based on Sparse Polynomials -- A State-Based Model for Certificate Management Systems -- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence -- The Composite Discrete Logarithm and Secure Authentication -- Chosen-Ciphertext Security for Any One-Way Cryptosystem -- Short Proofs of Knowledge for Factoring -- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms -- All-or-Nothing Transform and Remotely Keyed Encryption Protocols -- Security of Public Key Certificate Based Authentication Protocols -- Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2 -- Key Recovery in Third Generation Wireless Communication Systems -- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications -- Certificates of Recoverability with Scalable Recovery Agent Security -- Design Validations for Discrete Logarithm Based Signature Schemes -- Optimally Efficient Accountable Time-Stamping -- “Pseudorandom Intermixing”: A Tool for Shared Cryptography -- RSA-Based Auto-recoverable Cryptosystems -- Efficient and Fresh Certification -- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions -- Cryptographic Approaches to Privacy in Forensic DNA Databases -- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes -- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ) -- An Auction Protocol Which Hides Bids of Losers -- Forward Secrecy and Its Application to Future Mobile Communications Security -- Selecting Cryptographic Key Sizes -- A Structured ElGamal-Type Multisignature Scheme.
format Texto
topic_facet Computer science.
Computer communication systems.
Computer programming.
Operating systems (Computers).
Data encryption (Computer science).
Algorithms.
Management information systems.
Computer Science.
Data Encryption.
Programming Techniques.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer Communication Networks.
Management of Computing and Information Systems.
author Imai, Hideki. editor.
Zheng, Yuliang. editor.
SpringerLink (Online service)
author_facet Imai, Hideki. editor.
Zheng, Yuliang. editor.
SpringerLink (Online service)
author_sort Imai, Hideki. editor.
title Public Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings /
title_short Public Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings /
title_full Public Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings /
title_fullStr Public Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings /
title_full_unstemmed Public Key Cryptography [electronic resource] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings /
title_sort public key cryptography [electronic resource] : third international workshop on practice and theory in public key cryptosystems, pkc 2000, melbourne, victoria, australia, january 18-20, 2000. proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 2000
url http://dx.doi.org/10.1007/b75033
work_keys_str_mv AT imaihidekieditor publickeycryptographyelectronicresourcethirdinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2000melbournevictoriaaustraliajanuary18202000proceedings
AT zhengyuliangeditor publickeycryptographyelectronicresourcethirdinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2000melbournevictoriaaustraliajanuary18202000proceedings
AT springerlinkonlineservice publickeycryptographyelectronicresourcethirdinternationalworkshoponpracticeandtheoryinpublickeycryptosystemspkc2000melbournevictoriaaustraliajanuary18202000proceedings
_version_ 1756265155218374656