Public key cryptography : PKC 2007 : 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007 : proceedings / Tatsuaki Okamoto, Xiaoyun Wang (eds.).
Material type:
TextSeries: Lecture notes in computer science ; 4450.Publication details: Berlin ; New York : Springer, ©2007.Description: 1 online resource (xiii, 489 pages) : illustrationsContent type: - text
- computer
- online resource
- 9783540716778
- 3540716777
- 3540716769
- 9783540716761
- 9786610949151
- 6610949158
- PKC 2007
- 10th International Workshop on Practice and Theory in Public-Key Cryptography
- Tenth International Workshop on Practice and Theory in Public-Key Cryptography
- Computer security -- Congresses
- Computers -- Access control -- Congresses
- Data encryption (Computer science) -- Congresses
- Public key cryptography -- Congresses
- Sécurité informatique -- Congrès
- Ordinateurs -- Accès -- Contrôle -- Congrès
- Chiffrement (Informatique) -- Congrès
- Cryptographie à clé publique -- Congrès
- COMPUTERS -- Internet -- Security
- COMPUTERS -- Networking -- Security
- COMPUTERS -- Security -- General
- Informatique
- Computer security
- Computers -- Access control
- Data encryption (Computer science)
- Public key cryptography
- algoritmen
- algorithms
- computeranalyse
- computer analysis
- computers
- samenleving
- society
- informatiesystemen
- information systems
- computerwetenschappen
- computer sciences
- computernetwerken
- computer networks
- gegevensbeheer
- data management
- Information and Communication Technology (General)
- Informatie- en communicatietechnologie (algemeen)
- 005.8 22
- QA76.9.A25 I567 2007eb
| Item type | Current library | Collection | Call number | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
eBook
|
e-Library | eBook LNCS | Available |
"International Association for Cryptologic Research"--Cover
Includes bibliographical references and index.
Print version record.
Signatures I -- Full-Domain Subgroup Hiding and Constant-Size Group Signatures -- A Direct Anonymous Attestation Scheme for Embedded Devices -- Anonymous Signatures Made Easy -- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures -- Invited Talk I -- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions -- Cryptanalysis -- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol -- New Chosen-Ciphertext Attacks on NTRU -- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003 -- Protocols I -- Optimistic Fair Exchange in a Multi-user Setting -- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures -- Knowledge-Binding Commitments with Applications in Time-Stamping -- Signatures II -- Efficient Ring Signatures Without Random Oracles -- Traceable Ring Signature -- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles -- Improved On-Line/Off-Line Threshold Signatures -- Multivariate Cryptosystems -- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems -- Cryptanalysis of HFE with Internal Perturbation --?-Invertible Cycles for ultivariate uadratic () Public Key Cryptography -- Encryption -- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman -- Parallel Key-Insulated Public Key Encryption Without Random Oracles -- Multi-bit Cryptosystems Based on Lattice Problems -- Protocols II -- Practical and Secure Solutions for Integer Comparison -- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol -- Identity-Based Traitor Tracing -- Verifiable Shuffle of Large Size Ciphertexts -- Invited Talk II -- A Survey of Single-Database Private Information Retrieval: Techniques and Applications -- Number Theoretic Techniques -- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA -- Efficient Pseudorandom Generators Based on the DDH Assumption -- Fast Batch Verification of Multiple Signatures -- Public-Key Infrastructure -- A Closer Look at PKI: Security and Efficiency -- Self-Generated-Certificate Public Key Encryption Without Pairing.