000 04748nam a22006375i 4500
001 978-3-540-44586-9
003 DE-He213
005 20240423132501.0
007 cr nn 008mamaa
008 121227s2001 gw | s |||| 0|eng d
020 _a9783540445869
_9978-3-540-44586-9
024 7 _a10.1007/3-540-44586-2
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aPublic Key Cryptography
_h[electronic resource] :
_b4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2001, Cheju Island, Korea, February 13-15, 2001. Proceedings /
_cedited by Kwangjo Kim.
250 _a1st ed. 2001.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2001.
300 _aXII, 428 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1992
505 0 _aOn the Security o a Williams Based Public Key Encryption Scheme -- Semantically Secure McEliece Public-Key Cryptosystems -Conversions for McEliece PKC - -- IND-CCA Public Key Schemes Equivalent to Factoring n =pq -- Identification, Signature and Signcryption Using High Order Residues Modulo an RSA Composite -- On the Security o Lenstra’ s Variant o DSA without Long Inversions -- Fast Irreducibility and Subgroup Membership Testing in XTR -- A New Aspect for Security Notions: Secure Randomness in Public-Key Encryption Schemes -- The Gap-Problems: A New Class of Problems for the Security of Cryptographic Schemes -- A Generalisation, a Simpli.cation and Some Applications of Paillier's Probabilistic Public-Key System -- Marking: A Privacy Protecting Approach Against Blackmailing -- Cryptanalysis of Two Sparse Polynomial Based Public Key Cryptosystems -- Cryptanalysis of PKP: A New Approach -- Cryptanalysis of a Digital Signature Scheme on ID-Based Key-Sharing Infrastructures -- Loopholes in Two Public Key Cryptosystems Using the Modular Group -- Efficient Revocation in Group Signatures -- A Public-Key Traitor Tracing Scheme with Revocation Using Dynamic Shares -- Efficient Asymmetric Self-Enforcement Scheme with Public Traceability -- Adaptive Security for the Additive-Sharing Based Proactive RSA -- Robust Forward-Secure Signature Schemes with Proactive Security -- Equitability in Retroactive Data Confiscation versus Proactive Key Escrow -- A PVSS as Hard as Discrete Log and Shareholder Separability -- One Round Threshold Discrete-Log Key Generation without Private Channels -- Remarks on Mix-Network Based on Permutation Networks -- New Key Recovery in WAKE Protocol -- Redundant Representation of Finite Fields -- Compact Encoding of Non-adjacent Forms with Applications to Elliptic CurveCryptography -- Efficient Implementation of Elliptic Curve Cryptosystems on the TI MSP430x33x Family of Microcontrollers -- Secure Server-Aided Signature Generation -- Efficient Long-Term Validation of Digital Signatures -- A Novel Systolic Architecture for an Efficient RSA Implementation.
520 _aThis book constitutes the refereed proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography, PKC 2001, held in Cheju Island, Korea in February 2001. The 30 revised full papers presented were carefully reviewed and selected from 67 submissions. The papers address all current issues in public key cryptography, ranging from mathematical foundations to implementation issues.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aAlgorithms.
650 0 _aComputer networks .
650 0 _aOperating systems (Computers).
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aCryptology.
650 2 4 _aAlgorithms.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
650 2 4 _aIT Operations.
700 1 _aKim, Kwangjo.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540416586
776 0 8 _iPrinted edition:
_z9783662203415
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v1992
856 4 0 _uhttps://doi.org/10.1007/3-540-44586-2
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c188252
_d188252