Advances in Cryptology - Asiacrypt 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings - Lecture Notes in Computer Science - Tatsuaki Okamoto - Kirjat - Springer-Verlag Berlin and Heidelberg Gm - 9783540414049 - keskiviikko 22. marraskuuta 2000
Mikäli Kansi ja otsikko eivät täsmää, on otsikko oikein

Advances in Cryptology - Asiacrypt 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings - Lecture Notes in Computer Science

Tatsuaki Okamoto

Hinta
£ 45,99

Tilattu etävarastosta

Arvioitu toimitus pe 26. syys - ma 6. loka
Lisää iMusic-toivelistallesi
Eller

Advances in Cryptology - Asiacrypt 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security, Kyoto, Japan, December 3-7, 2000 Proceedings - Lecture Notes in Computer Science

This collection of lecture notes in computer science focuses on the proceedings of the 6th International Conference on the theory and application of Cryptology and Information Security, held in Kyoto, Japan.


Marc Notes: Includes bibliographical references and index. Table of Contents: Cryptanalysis I.- Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers.- Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt 99.- Why Textbook ElGamal and RSA Encryption Are Insecure.- Cryptanalysis of the TTM Cryptosystem.- Attacking and Repairing Batch Verification Schemes.- IACR Distinguished Lecture.- Cryptography Everywhere.- Digital Signatures.- Security of Signed ElGamal Encryption.- From Fixed-Length to Arbitrary-Length RSA Padding Schemes.- Towards Signature-Only Signature Schemes.- A New Forward-Secure Digital Signature Scheme.- Unconditionally Secure Digital Signature Schemes Admitting Transferability.- Protocols I.- Efficient Secure Multi-party Computation.- Mix and Match: Secure Function Evaluation via Ciphertexts.- A Length-Invariant Hybrid Mix.- Attack for Flash MIX.- Distributed Oblivious Transfer.- Number Theoretic Algorithms.- Key Improvements to XTR.- Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders.- Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three.- Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems.- Symmetric-Key Schemes I.- Provable Security for the Skipjack-like Structure against Differential Cryptanalysis and Linear Cryptanalysis.- On the Pseudorandomness of Top-Level Schemes of Block Ciphers.- Exploiting Multiples of the Connection Polynomial in Word-Oriented Stream Ciphers.- Encode-Then-Encipher Encryption: How to Exploit Nonces or Redundancy in Plaintexts for Efficient Cryptography.- Protocols II.- Verifiable Encryption, Group Encryption, and Their Applications to Separable Group Signatures and Signature Sharing Schemes.- Addition of El Gamal Plaintexts.- Improved Methods to Perform Threshold RSA.- Commital Deniable Proofs and Electronic Campaign Finance.- Provably Secure Metering Scheme.- Invited Lecture.- CRYPTREC Project Cryptographic Evaluation Project for the Japanese Electronic Government.- Fingerprinting.- Anonymous Fingerprinting with Direct Non-repudiation.- Efficient Anonymous Fingerprinting with Group Signatures.- Zero-Knowledge and Provable Security.- Increasing the Power of the Dealer in Non-interactive Zero-Knowledge Proof Systems.- Zero-Knowledge and Code Obfuscation.- A Note on Security Proofs in the Generic Model.- Boolean Functions.- On Relationships among Avalanche, Nonlinearity, and Correlation Immunity.- Cryptanalysis II.- Cryptanalysis of the Yi-Lam Hash.- Power Analysis, What Is Now Possible....- Pseudorandomness.- Concrete Security Characterizations of PRFs and PRPs: Reductions and Applications.- Symmetric-Key Schemes II.- The Security of Chaffing and Winnowing.- Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm.- Increasing the Lifetime of a Key: A Comparative Analysis of the Security of Re-keying Techniques.- Proofs of Security for the Unix Password Hashing Algorithm.- Public-Key Encryption and Key Distribution.- Trapdooring Discrete Logarithms on Elliptic Curves over Rings.- Strengthening McEliece Cryptosystem.- Password-Authenticated Key Exchange Based on RSA.- Round-Efficient Conference Key Agreement Protocols with Provable Security."Publisher Marketing: This book constitutes the refereed proceedings of the 6th International Conference on the Theory and Application of Cryptology and Security, ASIACRYPT 2000, held in Kyoto, Japan in December 2000. were carefully reviewed and selected from a total of 140 submissions. signatures, cryptographic protocols, number-theoretic algorithms, symmetric-key schemes, fingerprinting, zero-knowledge and provable security, Boolean functions, pseudorandomness, and public-key encryption and key distribution.

Media Kirjat     Paperback Book   (Kirja pehmeillä kansilla ja liimatulla selällä)
Julkaisupäivämäärä keskiviikko 22. marraskuuta 2000
ISBN13 9783540414049
Tuottaja Springer-Verlag Berlin and Heidelberg Gm
Sivujen määrä 648
Mitta 155 × 233 × 33 mm   ·   1,48 kg
Kieli German  
Toimittaja Okamoto, Tatsuaki

Näytä kaikki

Lisää tuotteita Tatsuaki Okamoto