New Added

Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :, proceedings

Like Score+506

Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :, proceedings
Original Title Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :, proceedings
Author EUROCRYPT (2000 : Bruges, Belgium), Preneel, Bart, 1963-
Publication date

Topics Cryptography, Data encryption (Computer science)
Publisher Berlin , New York : Springer
Collection folkscanomy_miscellaneous, folkscanomy, additional_collections
Language English
Book Type EBook
Material Type Book
File Type PDF
Downloadable Yes
Support Mobile, Desktop, Tablet
Scan Quality: Best No watermark
PDF Quality: Good
Availability Yes
Price 0.00
Submitted By
Sketch the Cow
Submit Date
Advances in Cryptology — EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14–18, 2000 ProceedingsAuthor: Bart Preneel Published by Springer Berlin Heidelberg ISBN: 978-3-540-67517-4 DOI: 10.1007/3-540-45539-6Table of Contents:Factorization of a 512-Bit RSA Modulus
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves
Analysis and Optimization of the TWINKLE Factoring Device
Noisy Polynomial Interpolation and Noisy Chinese Remaindering
A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
On the Security of 3GPP Networks
One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval
Single Database Private Information Retrieval Implies Oblivious Transfer
Authenticated Key Exchange Secure against Dictionary Attacks
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
Fair Encryption of RSA Keys
Computing Inverses over a Shared Secret Modulus
Practical Threshold Signatures
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
Confirmer Signature Schemes Secure against Adaptive Adversaries
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
Security Aspects of Practical Quantum CryptographyIncludes bibliographical references and index
We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account
Reset Password
Compare items
  • Total (0)
Compare
0