Public Key Cryptography: First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98 Pacifico Yokohama, Japan, February 5–6, 1998 Proceedings

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

This book constitutes the refereed proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, held in Pacifico Yokohama, Japan, in February 1998.
The volume presents four invited contributions together with 18 revised full papers selected from 30 submissions. The papers address all current issues in research and design in the area including digital signature schemes, digital payment systems, electronic commerce, cryptographic protocols, as well as foundational issues like integer factorization, elliptic curve aspects, hash functions, finite fields, etc.

Author(s): Yair Frankel, Moti Yung (auth.), Hideki Imai, Yuliang Zheng (eds.)
Series: Lecture Notes in Computer Science 1431
Edition: 1
Publisher: Springer-Verlag Berlin Heidelberg
Year: 1998

Language: English
Pages: 271
Tags: Data Encryption; Algorithm Analysis and Problem Complexity; Computer Communication Networks

Distributed public key cryptosystems....Pages 1-13
How (not) to design RSA signature schemes....Pages 14-28
Overview of elliptic curve cryptography....Pages 29-49
Lattices and cryptography: An overview....Pages 50-54
A signcryption scheme with signature directly verifiable by public key....Pages 55-59
Guaranteed correct sharing of integer factorization with off-line shareholders....Pages 60-71
Lower bounds on term-based divisible cash systems....Pages 72-82
Certifying trust....Pages 83-98
On the security of server-aided RSA protocols....Pages 99-116
On the security of ElGamal based encryption....Pages 117-134
An authenticated Diffie-Hellman key agreement protocol secure against active attacks....Pages 135-148
On the security of Girault's identification scheme....Pages 149-153
A scheme for obtaining a message from the digital multisignature....Pages 154-163
Secure hyperelliptic cryptosystems and their performance....Pages 164-181
A practical implementation of elliptic curve cryptosystems over GF(p ) on a 16-bit microcomputer....Pages 182-194
Two efficient algorithms for arithmetic of elliptic curves using Frobenius map....Pages 195-202
Public-key cryptosystems using the modular group....Pages 203-216
A cellular automaton based fast one-way hash function suitable for hardware implementation....Pages 217-233
A new hash function based on MDx-family and its application to MAC....Pages 234-246
Security issues for contactless smart cards....Pages 247-252
Parameters for secure elliptic curve cryptosystem -improvements on Schoof s algorithm....Pages 253-257
A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme....Pages 258-262