New Added

Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings

Like Score+198

Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
Original Title Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
Author International Conference on the Theory and Application of Cryptology and Information Security (6th : 2000 : Kyoto, Japan), Okamoto, Tatsuaki
Publication date

Topics Computer security, Cryptography
Publisher Berlin , New York : Springer
Collection folkscanomy_miscellaneous, folkscanomy, additional_collections
Language English
Book Type EBook
Material Type Book
File Type PDF
Downloadable Yes
Support Mobile, Desktop, Tablet
Scan Quality: Best No watermark
PDF Quality: Good
Availability Yes
Price 0.00
Submitted By
Sketch the Cow
Submit Date
Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 ProceedingsAuthor: Tatsuaki Okamoto Published by Springer Berlin Heidelberg ISBN: 978-3-540-41404-9 DOI: 10.1007/3-540-44448-3Table of Contents:Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt ’99
Why Textbook ElGamal and RSA Encryption Are Insecure
Cryptanalysis of the TTM Cryptosystem
Attacking and Repairing Batch Verification Schemes
Cryptography Everywhere
Security of Signed ElGamal Encryption
From Fixed-Length to Arbitrary-Length RSA Padding Schemes
Towards Signature-Only Signature Schemes
A New Forward-Secure Digital Signature Scheme
Unconditionally Secure Digital Signature Schemes Admitting Transferability
Efficient Secure Multi-party Computation
Mix and Match: Secure Function Evaluation via Ciphertexts
A Length-Invariant Hybrid Mix
Attack for Flash MIX
Distributed Oblivious Transfer
Key Improvements to XTR
Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
Construction of Hyperelliptic Curves with CM and Its Application to CryptosystemsIncludes bibliographical references and index
We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account
Reset Password
Compare items
  • Total (0)
Compare
0