skip to content
Public Key Cryptography Preview this item
ClosePreview this item
Checking...

Public Key Cryptography " PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6 8, 2003 Proceedings.

Author: Yvo G Desmedt
Publisher: Berlin ; Heidelberg : Springer-Verlag Berlin Heidelberg, 2002.
Series: Lecture notes in computer science, 2567
Edition/Format:   eBook : Document : EnglishView all editions and formats
Summary:
PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Additional Physical Format: Printed edition:
Material Type: Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Yvo G Desmedt
ISBN: 9783540362883 3540362886
OCLC Number: 756535635
Description: 1 online resource.
Contents: Diffie-Hellman Based Schemes --
Efficient Construction of (Distributed) Verifiable Random Functions --
An Identity-Based Signature from Gap Diffie-Hellman Groups --
Threshold Cryptography --
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme --
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack --
Reduction Proofs --
On the Bit Security of NTRUEncrypt --
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks --
Broadcast and Tracing --
Randomness Re-use in Multi-recipient Encryption Schemeas --
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack --
Digital Signatures --
The Cramer-Shoup Strong-RSA Signature Scheme Revisited --
Strong Key-Insulated Signature Schemes --
Specialized Multiparty Cryptography --
A Verifiable Secret Shuffe of Homomorphic Encryptions --
Round-Optimal Contributory Conference Key Agreement --
Cryptanalysis I --
Security Analysis of the MOR Cryptosystem --
A Practical Attack on Some Braid Group Based Cryptographic Primitives --
Elliptic Curves:Implementation Attacks --
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems --
Validation of Elliptic Curve Public Keys --
Exceptional Procedure Attack on Elliptic Curve Cryptosystems --
Implementation and Hardware Issues --
On Montgomery-Like Representations for Elliptic Curves over GF(2k) --
A Dedicated Sieving Hardware --
A Fast and Secure Implementation of Sflash --
New Public Key Schemes --
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes --
A Lattice Based Public Key Cryptosystem Using Polynomial Representations --
Elliptic Curves:General Issues --
The Security of DSA and ECDSA --
Cryptanalysis II --
Side-Channel Attacks on Textbook RSA and ElGamal Encryption --
On the Security of HFE, HFEv- and Quartz --
Generic Attacks and the Security of Quartz.
Series Title: Lecture notes in computer science, 2567

Abstract:

PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were 105 submitted papers which were considered by the Program Committee. This is an increase of 52% compared to PKC 2002, which took place in Paris, France, February 2002, and which was incorrectly identi?ed on the cover of the proceedings as being the fourth workshop. Due to the large number of submissions, some papers that contained new ideas had to be rejected. Priority was given to novel papers. Of the 105 submissions, 26 were selected for the proceedings. These contain the revised versions of the accepted papers. Each paper was sent to at least 3 members of the program committee for comments. Revisions were not checked for correctness of their scienti?c aspects and the authors bear full responsibility for the contents of their papers. Some authors will write?nal versions of their papers for publication in refereed journals. I am very grateful to the members of the Program Committee for their hard work in the di?cult task of selecting roughly 1 out of 4 of the submitted papers.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/756535635> # Public Key Cryptography " PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6 8, 2003 Proceedings.
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "756535635" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/352483966#Place/heidelberg> ; # Heidelberg
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/352483966#Place/berlin> ; # Berlin
    schema:about <http://experiment.worldcat.org/entity/work/data/352483966#Topic/data_encryption> ; # Data Encryption
    schema:about <http://id.worldcat.org/fast/872451> ; # Computer science
    schema:about <http://experiment.worldcat.org/entity/work/data/352483966#Topic/computer_science_general> ; # Computer Science, general
    schema:about <http://experiment.worldcat.org/entity/work/data/352483966#Topic/information_systems> ; # Information Systems
    schema:about <http://experiment.worldcat.org/entity/work/data/352483966#Topic/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems
    schema:about <http://id.loc.gov/authorities/subjects/sh85029534> ; # Computer software
    schema:about <http://experiment.worldcat.org/entity/work/data/352483966#Topic/computer_communication_networks> ; # Computer Communication Networks
    schema:about <http://id.worldcat.org/fast/872527> ; # Computer software
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://id.loc.gov/authorities/subjects/sh89003285> ; # Computer science
    schema:about <http://experiment.worldcat.org/entity/work/data/352483966#Topic/algorithm_analysis_and_problem_complexity> ; # Algorithm Analysis and Problem Complexity
    schema:about <http://dewey.info/class/004/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/352483966#Topic/computers_and_society> ; # Computers and Society
    schema:bookFormat schema:EBook ;
    schema:creator <http://viaf.org/viaf/10545164> ; # Yvo G. Desmedt
    schema:datePublished "2002" ;
    schema:description "Diffie-Hellman Based Schemes -- Efficient Construction of (Distributed) Verifiable Random Functions -- An Identity-Based Signature from Gap Diffie-Hellman Groups -- Threshold Cryptography -- Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme -- An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack -- Reduction Proofs -- On the Bit Security of NTRUEncrypt -- Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks -- Broadcast and Tracing -- Randomness Re-use in Multi-recipient Encryption Schemeas -- Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack -- Digital Signatures -- The Cramer-Shoup Strong-RSA Signature Scheme Revisited -- Strong Key-Insulated Signature Schemes -- Specialized Multiparty Cryptography -- A Verifiable Secret Shuffe of Homomorphic Encryptions -- Round-Optimal Contributory Conference Key Agreement -- Cryptanalysis I -- Security Analysis of the MOR Cryptosystem -- A Practical Attack on Some Braid Group Based Cryptographic Primitives -- Elliptic Curves:Implementation Attacks -- A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems -- Validation of Elliptic Curve Public Keys -- Exceptional Procedure Attack on Elliptic Curve Cryptosystems -- Implementation and Hardware Issues -- On Montgomery-Like Representations for Elliptic Curves over GF(2k) -- A Dedicated Sieving Hardware -- A Fast and Secure Implementation of Sflash -- New Public Key Schemes -- A Practical Public Key Cryptosystem from Paillier and Rabin Schemes -- A Lattice Based Public Key Cryptosystem Using Polynomial Representations -- Elliptic Curves:General Issues -- The Security of DSA and ECDSA -- Cryptanalysis II -- Side-Channel Attacks on Textbook RSA and ElGamal Encryption -- On the Security of HFE, HFEv- and Quartz -- Generic Attacks and the Security of Quartz."@en ;
    schema:description "PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were 105 submitted papers which were considered by the Program Committee. This is an increase of 52% compared to PKC 2002, which took place in Paris, France, February 2002, and which was incorrectly identi?ed on the cover of the proceedings as being the fourth workshop. Due to the large number of submissions, some papers that contained new ideas had to be rejected. Priority was given to novel papers. Of the 105 submissions, 26 were selected for the proceedings. These contain the revised versions of the accepted papers. Each paper was sent to at least 3 members of the program committee for comments. Revisions were not checked for correctness of their scienti?c aspects and the authors bear full responsibility for the contents of their papers. Some authors will write?nal versions of their papers for publication in refereed journals. I am very grateful to the members of the Program Committee for their hard work in the di?cult task of selecting roughly 1 out of 4 of the submitted papers."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/352483966> ;
    schema:genre "Electronic books"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/352483966#CreativeWork/> ;
    schema:name "Public Key Cryptography " PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6 8, 2003 Proceedings."@en ;
    schema:productID "756535635" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/756535635#PublicationEvent/berlin_heidelberg_springer_verlag_berlin_heidelberg_2002> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/352483966#Agent/springer_verlag_berlin_heidelberg> ; # Springer-Verlag Berlin Heidelberg
    schema:url <http://gate.lib.buffalo.edu/login?url=https://link.springer.com/book/10.1007/3-540-36288-6> ;
    schema:url <http://link.springer.com/openurl?genre=book&isbn=978-3-540-00324-3> ;
    schema:url <http://dx.doi.org/10.1007/3-540-36288-6> ;
    schema:workExample <http://worldcat.org/isbn/9783540362883> ;
    schema:workExample <http://dx.doi.org/10.1007/3-540-36288-6> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/756535635> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/352483966#Agent/springer_verlag_berlin_heidelberg> # Springer-Verlag Berlin Heidelberg
    a bgn:Agent ;
    schema:name "Springer-Verlag Berlin Heidelberg" ;
    .

<http://experiment.worldcat.org/entity/work/data/352483966#Topic/algorithm_analysis_and_problem_complexity> # Algorithm Analysis and Problem Complexity
    a schema:Intangible ;
    schema:name "Algorithm Analysis and Problem Complexity"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/352483966#Topic/computer_communication_networks> # Computer Communication Networks
    a schema:Intangible ;
    schema:name "Computer Communication Networks"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/352483966#Topic/computer_science_general> # Computer Science, general
    a schema:Intangible ;
    schema:name "Computer Science, general"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/352483966#Topic/computers_and_society> # Computers and Society
    a schema:Intangible ;
    schema:name "Computers and Society"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/352483966#Topic/information_systems> # Information Systems
    a schema:Intangible ;
    schema:name "Information Systems"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/352483966#Topic/management_of_computing_and_information_systems> # Management of Computing and Information Systems
    a schema:Intangible ;
    schema:name "Management of Computing and Information Systems"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh85029534> # Computer software
    a schema:Intangible ;
    schema:name "Computer software"@en ;
    .

<http://id.loc.gov/authorities/subjects/sh89003285> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://id.worldcat.org/fast/872451> # Computer science
    a schema:Intangible ;
    schema:name "Computer science"@en ;
    .

<http://id.worldcat.org/fast/872527> # Computer software
    a schema:Intangible ;
    schema:name "Computer software"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/10545164> # Yvo G. Desmedt
    a schema:Person ;
    schema:familyName "Desmedt" ;
    schema:givenName "Yvo G." ;
    schema:name "Yvo G. Desmedt" ;
    .

<http://worldcat.org/entity/work/data/352483966#CreativeWork/>
    a schema:CreativeWork ;
    schema:description "Printed edition:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/756535635> ; # Public Key Cryptography " PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6 8, 2003 Proceedings.
    .

<http://worldcat.org/isbn/9783540362883>
    a schema:ProductModel ;
    schema:isbn "3540362886" ;
    schema:isbn "9783540362883" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/756535635> ; # Public Key Cryptography " PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6 8, 2003 Proceedings.
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture Notes in Computer Science ;" ;
    .

<http://www.worldcat.org/title/-/oclc/756535635>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/756535635> ; # Public Key Cryptography " PKC 2003 : 6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6 8, 2003 Proceedings.
    schema:dateModified "2018-02-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.