Advances in cryptology ASIACRYPT'98 : International Conference on the Theory and Application of Cryptology an
Author: International Conference on the Theory and Application of Cryptology and Information Security (4th : 1998 : Beijing, China), Ohta, Kazuo, Pʻei, Ting-i
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computer security, Data protection, Cryptography, clé accès, authentification, paiement électronique, automate fini, signature électronique, courbe elliptique, sécurité informatique, cryptographie, Sécurité informatique, Protection de l'information (Informatique), Geheimschrift, Coderingstheorie, Computerbeveiliging, Cryptographie, Protection de l'information (informatique), Computerbeveiliging, Cryptographie, Protection de l'information (informatique)
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540651098, 9783540651093
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 220.62 MB
PDF Size: 8.6 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 663
Views: 713
Total Files: 18
Media Type: texts
Total Files: 5
Last Modified: 2023-05-26 03:13:41
Size: 12.73 KB
Description
Author: Kazuo Ohta, Dingyi Pei
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-65109-3
DOI: 10.1007/3-540-49649-1
Table of Contents:
- Generating RSA Moduli with a Predetermined Portion
- Generation of Shared RSA Keys by Two Parties
- An Attack on RSA Given a Small Fraction of the Private Key Bits
- C
- ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture)
- Efficient Elliptic Curve Exponentiation Using Mixed Coordinates
- Efficient Implementation of Schoof’s Algorithm
- Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2
- Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings
- Elliptic Curve Discrete Logarithms and the Index Calculus
- Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers
- Improved Truncated Differential Attacks on SAFER
- Optimal Resistance Against the Davies and Murphy Attack
- A Group Signature Scheme with Improved Efficiency (Extended Abstract)
- A Study on the Proposed Korean Digital Signature Algorithm
- Cryptanalysis of the Original McEliece Cryptosystem
- Improving the Security of the McEliece Public-Key Cryptosystem
- Cryptanalysis in Prime Order Subgroups of Z
- Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC
- Bounds and Constructions for Multireceiver Authentication Codes
Includes bibliographical references and index