Document - eBookmela
Loading...

Advances in cryptology EUROCRYPT .. | EUROCRYPT, Chaum, David, Günther, Christoph G, Pichler, Franz

Likes0
Telegram icon Share on Telegram

Advances in cryptology EUROCRYPT ..

User Rating: Be the first one!

Author: EUROCRYPT, Chaum, David, Günther, Christoph G, Pichler, Franz

Added by: sketch

Added Date: 2015-12-30

Publication Date: 2001

Language: eng

Publishers: Berlin [u.a.] : Springer

Collections: journals contributions, journals

ISBN Number: 3540420703, 9783540420705

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 276.43 MB

PDF Size: 6.54 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Edition: [Elektronische Ressource]

Archive Url

Downloads: 383

Views: 433

Total Files: 18

Media Type: texts

Description

Advances in Cryptology — EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings
Author: Birgit Pfitzmann
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42070-5
DOI: 10.1007/3-540-44987-6

Table of Contents:

  • A Memory Efficient Version of Satoh’s Algorithm
  • Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
  • How Secure Are Elliptic Curves over Composite Extension Fields?
  • Efficient and Non-interactive Non-malleable Commitment
  • How to Convert the Flavor of a Quantum Bit Commitment
  • Cryptographic Counters and Applications to Electronic Voting
  • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
  • Priced Oblivious Transfer: How to Sell Digital Goods
  • A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
  • Practical Threshold RSA Signatures without a Trusted Dealer
  • Hash Functions: From Merkle-Damgård to Shoup
  • Key Recovery and Message Attacks on NTRU-Composite
  • Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
  • NSS: An NTRU Lattice-Based Signature Scheme
  • The Bit Security of Paillier’s Encryption Scheme and Its Applications
  • Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
  • On Adaptive vs. Non-adaptive Security of Multiparty Protocols
  • Multiparty Computation from Threshold Homomorphic Encryption
  • On Perfect and Adaptive Security in Exposure-Resilient Cryptography
  • Cryptanalysis of Reduced-Round MISTY

Literaturangaben
eBookmela
Logo
Register New Account