Proceedings of the 4th Intl Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, held February 12-14, 2002 in Paris, France. Among the topics addressed are encryption schemes, signature schemes, protocols, cryptanalysis, elliptic curve cryptography, and side channels. Softcover.
Author(s): Kouichi Sakurai, Tsuyoshi Takagi (auth.), David Naccache, Pascal Paillier (eds.)
Series: Lecture Notes in Computer Science 2274
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002
Language: English
Pages: 384
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive....Pages 1-16
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages....Pages 17-33
On Sufficient Randomness for Secure Public-Key Cryptosystems....Pages 34-47
Multi-recipient Public-Key Encryption with Shortened Ciphertext....Pages 48-63
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code....Pages 64-79
Formal Proofs for the Security of Signcryption....Pages 80-98
A Provably Secure Restrictive Partially Blind Signature Scheme....Pages 99-114
M + 1-st Price Auction Using Homomorphic Encryption....Pages 115-124
Client/Server Tradeoffs for Online Elections....Pages 125-140
Self-tallying Elections and Perfect Ballot Secrecy....Pages 141-158
Efficient 1-Out-n Oblivious Transfer Schemes....Pages 159-171
Linear Code Implies Public-Key Traitor Tracing....Pages 172-187
Design and Security Analysis of Anonymous Group Identification Protocols....Pages 188-198
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem....Pages 199-210
Solving Underdefined Systems of Multivariate Quadratic Equations....Pages 211-227
Selective Forgery of RSA Signatures with Fixed-Pattern Padding....Pages 228-236
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000....Pages 237-251
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation....Pages 252-262
A Combined Timing and Power Attack....Pages 263-279
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks....Pages 280-296
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report....Pages 297-309
An Improved Method of Multiplication on Certain Elliptic Curves....Pages 310-322
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves....Pages 323-334
Weierstraß Elliptic Curves and Side-Channel Attacks....Pages 335-345
One-Way Cross-Trees and Their Applications....Pages 346-356
RSA Key Generation with Verifiable Randomness....Pages 357-374
New Minimal Modified Radix- r Representation with Applications to Smart Cards....Pages 375-383