7. PKC 2004:
Singapore
Feng Bao, Robert H. Deng, Jianying Zhou (Eds.):
Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004.
Lecture Notes in Computer Science 2947 Springer 2004, ISBN 3-540-21018-0 BibTeX
@proceedings{DBLP:conf/pkc/2004,
editor = {Feng Bao and
Robert H. Deng and
Jianying Zhou},
title = {Public Key Cryptography - PKC 2004, 7th International Workshop
on Theory and Practice in Public Key Cryptography, Singapore,
March 1-4, 2004},
booktitle = {Public Key Cryptography},
publisher = {Springer},
series = {Lecture Notes in Computer Science},
volume = {2947},
year = {2004},
isbn = {3-540-21018-0},
bibsource = {DBLP, http://dblp.uni-trier.de}
}
- Johannes Blömer, Alexander May:
A Generalized Wiener Attack on RSA.
1-13
Electronic Edition (link) BibTeX
- Jean-Sébastien Coron:
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem.
14-27
Electronic Edition (link) BibTeX
- Roberto Maria Avanzi, Mathieu Ciet, Francesco Sica:
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism.
28-40
Electronic Edition (link) BibTeX
- Pradeep Kumar Mishra, Palash Sarkar:
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point.
41-54
Electronic Edition (link) BibTeX
- Stéphane Flon, Roger Oyono:
Fast Arithmetic on Jacobians of Picard Curves.
55-68
Electronic Edition (link) BibTeX
- Jean Monnerat, Serge Vaudenay:
Undeniable Signatures Based on Characters: How to Sign with One Bit.
69-85
Electronic Edition (link) BibTeX
- Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk:
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures.
86-100
Electronic Edition (link) BibTeX
- Huafei Zhu:
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model.
101-114
Electronic Edition (link) BibTeX
- Emmanuel Bresson, Dario Catalano:
Constant Round Authenticated Group Key Agreement via Distributed Computation.
115-129
Electronic Edition (link) BibTeX
- Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee:
Efficient ID-based Group Key Agreement with Bilinear Maps.
130-144
Electronic Edition (link) BibTeX
- Emmanuel Bresson, Olivier Chevassut, David Pointcheval:
New Security Results on Encrypted Key Exchange.
145-158
Electronic Edition (link) BibTeX
- Maria Isabel Gonzalez Vasco, Mats Näslund, Igor Shparlinski:
New Results on the Hardness of Diffie-Hellman Bits.
159-172
Electronic Edition (link) BibTeX
- Takeshi Koshiba, Kaoru Kurosawa:
Short Exponent Diffie-Hellman Problems.
173-186
Electronic Edition (link) BibTeX
- Benoît Libert, Jean-Jacques Quisquater:
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups.
187-200
Electronic Edition (link) BibTeX
- Nicolas Courtois:
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2.
201-217
Electronic Edition (link) BibTeX
- Alexander May:
Secret Exponent Attacks on RSA-type Schemes with Moduli N= prq.
218-230
Electronic Edition (link) BibTeX
- Reihaneh Safavi-Naini, Luke McAven, Moti Yung:
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures".
231-247
Electronic Edition (link) BibTeX
- Kaoru Kurosawa, Swee-Huay Heng:
From Digital Signature to ID-based Identification/Signature.
248-261
Electronic Edition (link) BibTeX
- Joonsang Baek, Yuliang Zheng:
Identity-Based Threshold Decryption.
262-276
Electronic Edition (link) BibTeX
- Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo:
An Efficient Signature Scheme from Bilinear Pairings and Its Applications.
277-290
Electronic Edition (link) BibTeX
- Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka:
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications.
291-304
Electronic Edition (link) BibTeX
- Jintai Ding:
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation.
305-318
Electronic Edition (link) BibTeX
- Jun Furukawa:
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability.
319-332
Electronic Edition (link) BibTeX
- Brian King:
A Point Compression Method for Elliptic Curves Defined over GF(2 n).
333-345
Electronic Edition (link) BibTeX
- Toru Akishita, Tsuyoshi Takagi:
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny.
346-359
Electronic Edition (link) BibTeX
- Rui Zhang, Goichiro Hanaoka, Junji Shikata, Hideki Imai:
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?
360-374
Electronic Edition (link) BibTeX
- Farid F. Elwailly, Craig Gentry, Zulfikar Ramzan:
QuasiModo: Efficient Certificate Validation and Revocation.
375-388
Electronic Edition (link) BibTeX
- Satoshi Koga, Kouichi Sakurai:
A Distributed Online Certificate Status Protocol with a Single Public Key.
389-401
Electronic Edition (link) BibTeX
- Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya:
A First Approach to Provide Anonymity in Attribute Certificates.
402-415
Electronic Edition (link) BibTeX
- Igor Shparlinski, Arne Winterhof:
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups.
416-424
Electronic Edition (link) BibTeX
- Andris Ambainis, Markus Jakobsson, Helger Lipmaa:
Cryptographic Randomized Response Techniques.
425-438
Electronic Edition (link) BibTeX
- Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan:
A Correct, Private, and Efficient Mix Network.
439-454
Electronic Edition (link) BibTeX
Copyright © Sat May 16 23:33:26 2009
by Michael Ley (ley@uni-trier.de)