Advances in Cryptology - ASIACRYPT 2003: 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2003, held in Taipei, Taiwan in November/December 2003.

The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on public key cryptography, number theory, efficient implementations, key management and protocols, hash functions, group signatures, block cyphers, broadcast and multicast, foundations and complexity theory, and digital signatures.

Author(s): Duong Hieu Phan, David Pointcheval (auth.), Chi-Sung Laih (eds.)
Series: Lecture Notes in Computer Science 2894
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2003

Language: English
Pages: 550
Tags: Data Encryption; Computer Communication Networks; Operating Systems; Algorithm Analysis and Problem Complexity; Discrete Mathematics in Computer Science; Management of Computing and Information Systems

Front Matter....Pages -
Chosen-Ciphertext Security without Redundancy....Pages 1-18
Some RSA-Based Encryption Schemes with Tight Security Reduction....Pages 19-36
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications....Pages 37-54
Factoring Estimates for a 1024-Bit RSA Modulus....Pages 55-74
Index Calculus Attack for Hyperelliptic Curves of Small Genus....Pages 75-92
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves....Pages 93-110
Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p – x + d ....Pages 111-123
The AGM- X 0 ( N ) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting....Pages 124-136
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy....Pages 137-154
Leakage-Resilient Authenticated Key Establishment Protocols....Pages 155-172
Untraceable Fair Network Payment Protocols with Off-Line TTP....Pages 173-187
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking....Pages 188-207
New Parallel Domain Extenders for UOWHF....Pages 208-227
Cryptanalysis of 3-Pass HAVAL....Pages 228-245
Efficient Group Signatures without Trapdoors....Pages 246-268
Accumulating Composites and Improved Group Signing....Pages 269-286
Almost Uniform Density of Power Residues and the Provable Security of ESIGN....Pages 287-301
Rotations and Translations of Number Field Sieve Polynomials....Pages 302-310
On Class Group Computations Using the Number Field Sieve....Pages 311-325
The Secret and Beauty of Ancient Chinese Padlocks....Pages 326-330
A Traceable Block Cipher....Pages 331-346
A New Attack against Khazad....Pages 347-358
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack....Pages 359-373
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes....Pages 374-391
Boneh et al. ’s k -Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption....Pages 392-397
On Diophantine Complexity and Statistical Zero-Knowledge Arguments....Pages 398-415
Verifiable Homomorphic Oblivious Transfer and Private Equality Test....Pages 416-433
Generalized Powering Functions and Their Application to Digital Signatures....Pages 434-451
Certificateless Public Key Cryptography....Pages 452-473
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems....Pages 474-491
The Insecurity of Esign in Practical Implementations....Pages 492-506
Efficient One-Time Proxy Signatures....Pages 507-522
Universal Designated-Verifier Signatures....Pages 523-542
Back Matter....Pages -