Advances in cryptology ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Crypto
User Rating: Be the first one!
Author: International Conference on the Theory and Application of Cryptology and Information Security (6th : 2000 : Kyoto, Japan), Okamoto, Tatsuaki
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computer security, Cryptography
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540414045
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 347.07 MB
PDF Size: 5.89 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Edition: [Elektronische Ressource]
Downloads: 263
Views: 313
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 3 540 44448 3 archive t...torrent
Last Modified: 2023-05-26 03:11:04
Download
Size: 17.67 KB
Description
Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings
Author: Tatsuaki Okamoto
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41404-9
DOI: 10.1007/3-540-44448-3
Table of Contents:
Includes bibliographical references and index
Author: Tatsuaki Okamoto
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41404-9
DOI: 10.1007/3-540-44448-3
Table of Contents:
- Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
- Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt ’99
- Why Textbook ElGamal and RSA Encryption Are Insecure
- Cryptanalysis of the TTM Cryptosystem
- Attacking and Repairing Batch Verification Schemes
- Cryptography Everywhere
- Security of Signed ElGamal Encryption
- From Fixed-Length to Arbitrary-Length RSA Padding Schemes
- Towards Signature-Only Signature Schemes
- A New Forward-Secure Digital Signature Scheme
- Unconditionally Secure Digital Signature Schemes Admitting Transferability
- Efficient Secure Multi-party Computation
- Mix and Match: Secure Function Evaluation via Ciphertexts
- A Length-Invariant Hybrid Mix
- Attack for Flash MIX
- Distributed Oblivious Transfer
- Key Improvements to XTR
- Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
- Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
- Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts