Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptograp
User Rating: Be the first one!
Author: EUROCRYPT (2000 : Bruges, Belgium), Preneel, Bart, 1963-
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Cryptography, Data encryption (Computer science)
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540675175
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 335.90 MB
PDF Size: 5.85 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Edition: [Elektronische Ressource]
Downloads: 613
Views: 663
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 3 540 45539 6 archive t...torrent
Last Modified: 2023-05-26 03:12:13
Download
Size: 17.23 KB
Description
Advances in Cryptology — EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14–18, 2000 Proceedings
Author: Bart Preneel
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-67517-4
DOI: 10.1007/3-540-45539-6
Table of Contents:
Includes bibliographical references and index
Author: Bart Preneel
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-67517-4
DOI: 10.1007/3-540-45539-6
Table of Contents:
- Factorization of a 512-Bit RSA Modulus
- An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves
- Analysis and Optimization of the TWINKLE Factoring Device
- Noisy Polynomial Interpolation and Noisy Chinese Remaindering
- A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme
- Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1
- Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
- On the Security of 3GPP Networks
- One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval
- Single Database Private Information Retrieval Implies Oblivious Transfer
- Authenticated Key Exchange Secure against Dictionary Attacks
- Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
- Fair Encryption of RSA Keys
- Computing Inverses over a Shared Secret Modulus
- Practical Threshold Signatures
- Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
- Confirmer Signature Schemes Secure against Adaptive Adversaries
- Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
- Using Hash Functions as a Hedge against Chosen Ciphertext Attack
- Security Aspects of Practical Quantum Cryptography
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts