Advances in Cryptology - ASIACRYPT'98
Editat de Kazuo Ohta, Dingyi Peien Limba Engleză Paperback – 25 sep 1998
Preț: 328.94 lei
Preț vechi: 411.17 lei
-20%
Puncte Express: 493
Preț estimativ în valută:
58.15€ • 69.12$ • 50.46£
58.15€ • 69.12$ • 50.46£
Carte tipărită la comandă
Livrare economică 12-26 martie
Specificații
ISBN-13: 9783540651093
ISBN-10: 3540651098
Pagini: 452
Ilustrații: XII, 436 p. 2 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.68 kg
Ediția:1998
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540651098
Pagini: 452
Ilustrații: XII, 436 p. 2 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.68 kg
Ediția:1998
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Public Key Cryptosystems.- Generating RSA Moduli with a Predetermined Portion.- Generation of Shared RSA Keys by Two Parties.- An Attack on RSA Given a Small Fraction of the Private Key Bits.- C ?+ * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai.- Invited Talk.- ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture).- Elliptic Curve Cryptosystems.- Efficient Elliptic Curve Exponentiation Using Mixed Coordinates.- Efficient Implementation of Schoof’s Algorithm.- Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 n.- Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings.- Elliptic Curve Discrete Logarithms and the Index Calculus.- Cryptanalysis 1.- Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers.- Improved Truncated Differential Attacks on SAFER.- Optimal Resistance Against the Davies and Murphy Attack.- Signature.- A Group Signature Scheme with Improved Efficiency (Extended Abstract).- A Study on the Proposed Korean Digital Signature Algorithm.- Cryptanlysis 2.- Cryptanalysis of the Original McEliece Cryptosystem.- Improving the Security of the McEliece Public-Key Cryptosystem.- Cryptanalysis in Prime Order Subgroups of Z n * .- Finite Automata.- Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC.- Authentication Codes.- Bounds and Constructions for Multireceiver Authentication Codes.- Electronic Cash.- Fair Off-Line e-Cash Made Easy.- Off-line Fair Payment Protocols using Convertible Signatures.- Efficient Fair Exchange with Verifiable Confirmation of Signatures.- Adaptively Secure Oblivious Transfer.- Steam Ciphers.- ML-Sequences over Rings Z/(2e): I. Constructions of Nondegenerative ML-Sequences II. Injectivness of CompressionMappings of New Classes.- Analysis Methods for (Alleged) RC4.- Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators.- Cryptographic Protocols.- A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol.- The Béguin-Quisquater Server-Aided RSA Protocol from Crypto ’95 is not Secure.- Key Escrow.- Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) Extended Abstract.- New Cryptography.- Audio and Optical Cryptography.- Information Theory.- Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement.- Some Bounds and a Construction for Secure Broadcast Encryption.
Caracteristici
Includes supplementary material: sn.pub/extras