Public Key Cryptography: 5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Proceedings of the 4th Intl Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, held February 12-14, 2002 in Paris, France. Among the topics addressed are encryption schemes, signature schemes, protocols, cryptanalysis, elliptic curve cryptography, and side channels. Softcover.

Author(s): Kouichi Sakurai, Tsuyoshi Takagi (auth.), David Naccache, Pascal Paillier (eds.)
Series: Lecture Notes in Computer Science 2274
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 2002

Language: English
Pages: 384
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks

New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive....Pages 1-16
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages....Pages 17-33
On Sufficient Randomness for Secure Public-Key Cryptosystems....Pages 34-47
Multi-recipient Public-Key Encryption with Shortened Ciphertext....Pages 48-63
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code....Pages 64-79
Formal Proofs for the Security of Signcryption....Pages 80-98
A Provably Secure Restrictive Partially Blind Signature Scheme....Pages 99-114
M + 1-st Price Auction Using Homomorphic Encryption....Pages 115-124
Client/Server Tradeoffs for Online Elections....Pages 125-140
Self-tallying Elections and Perfect Ballot Secrecy....Pages 141-158
Efficient 1-Out-n Oblivious Transfer Schemes....Pages 159-171
Linear Code Implies Public-Key Traitor Tracing....Pages 172-187
Design and Security Analysis of Anonymous Group Identification Protocols....Pages 188-198
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem....Pages 199-210
Solving Underdefined Systems of Multivariate Quadratic Equations....Pages 211-227
Selective Forgery of RSA Signatures with Fixed-Pattern Padding....Pages 228-236
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000....Pages 237-251
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation....Pages 252-262
A Combined Timing and Power Attack....Pages 263-279
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks....Pages 280-296
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report....Pages 297-309
An Improved Method of Multiplication on Certain Elliptic Curves....Pages 310-322
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves....Pages 323-334
Weierstraß Elliptic Curves and Side-Channel Attacks....Pages 335-345
One-Way Cross-Trees and Their Applications....Pages 346-356
RSA Key Generation with Verifiable Randomness....Pages 357-374
New Minimal Modified Radix- r Representation with Applications to Smart Cards....Pages 375-383