Public key cryptography -- PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23--26, 2005. Proceedings. (Q2388722)

From MaRDI portal
scientific article
Language Label Description Also known as
English
Public key cryptography -- PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23--26, 2005. Proceedings.
scientific article

    Statements

    Public key cryptography -- PKC 2005. 8th international workshop on theory and practice in public key cryptography, Les Diablerets, Switzerland, January 23--26, 2005. Proceedings. (English)
    0 references
    0 references
    20 September 2005
    0 references
    The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1049.94003). Indexed articles: \textit{Yacobi, Oded; Yacobi, Yacov}, A new related message attack on RSA, 1-8 [Zbl 1081.94543] \textit{Bleichenbacher, Daniel}, Breaking a cryptographic protocol with pseudoprimes, 9-15 [Zbl 1081.94518] \textit{Naccache, David; Nguyên, Phong Q.; Tunstall, Michael; Whelan, Claire}, Experimenting with faults, lattices and the DSA, 16-28 [Zbl 1081.94533] \textit{Jonsson, Jakob; Robshaw, Matthew J. B.}, Securing RSA-KEM via the AES, 29-46 [Zbl 1081.94529] \textit{Abdalla, Michel; Chevassut, Olivier; Pointcheval, David}, One-time verifier-based encrypted key exchange, 47-64 [Zbl 1081.94512] \textit{Abdalla, Michel; Fouque, Pierre-Alain; Pointcheval, David}, Password-based authenticated key exchange in the three-party setting, 65-84 [Zbl 1081.94513] \textit{Schindler, Werner}, On the optimization of side-channel attacks by advanced stochastic methods, 85-103 [Zbl 1081.94536] \textit{Gjøsteen, Kristian}, Symmetric subgroup membership problems, 104-119 [Zbl 1081.94024] \textit{Ong, Emil; Kubiatowicz, John}, Optimizing robustness while generating shared secret safe primes, 120-137 [Zbl 1081.94032] \textit{Yang, Wu-Chuan; Guan, Dah-Jyh; Laih, Chi-Sung}, Fast multi-computations with integer similarity strategy, 138-153 [Zbl 1081.94544] \textit{Bangerter, Endre; Camenisch, Jan; Maurer, Ueli}, Efficient proofs of knowledge of discrete logarithms and representations in groups with hidden order, 154-171 [Zbl 1081.94015] \textit{Chu, Cheng-Kang; Tzeng, Wen-Guey}, Efficient \(k\)-out-of-\(n\) oblivious transfer schemes with adaptive and non-adaptive queries, 172-183 [Zbl 1081.94020] \textit{Steinfeld, Ron; Contini, Scott; Wang, Huaxiong; Pieprzyk, Josef}, Converse results to the Wiener attack on RSA, 184-198 [Zbl 1081.94537] \textit{Sun, Hung-Min; Yang, Cheng-Ta}, RSA with balanced short exponents and its application to entity authentication, 199-215 [Zbl 1081.94034] \textit{Hayashi, Ryotaro; Tanaka, Keisuke}, The sampling twice technique for the RSA-based cryptosystems with anonymity, 216-233 [Zbl 1081.94526] \textit{Cathalo, Julien; Coron, Jean-Sébastien; Naccache, David}, From fixed-length to arbitrary-length RSA encoding schemes revisited, 234-243 [Zbl 1081.94018] \textit{Wang, Lih-Chung; Hu, Yuh-Hua; Lai, Feipei; Chou, Chun-Yen; Yang, Bo-Yin}, Tractable rational map signature, 244-257 [Zbl 1081.94555] \textit{Joux, Antoine; Kunz-Jacques, Sébastien; Muller, Frédéric; Ricordel, Pierre-Michel}, Cryptanalysis of the tractable rational map cryptosystem, 258-274 [Zbl 1081.94029] \textit{Wolf, Christopher; Preneel, Bart}, Large superfluous keys in multivariate quadratic asymmetric systems, 275-287 [Zbl 1081.94541] \textit{Ding, Jintai; Schmidt, Dieter}, Cryptanalysis of HFEv and internal perturbation of HFE, 288-301 [Zbl 1081.94520] \textit{Granboulan, Louis}, A generic scheme based on trapdoor one-way permutations with signatures as short as possible, 302-312 [Zbl 1081.94550] \textit{Catalano, Dario; Gennaro, Rosario}, Cramer-Damgård signatures revisited: Efficient flat-tree signatures based on factoring, 313-327 [Zbl 1081.94547] \textit{Ogata, Wakaha; Kurosawa, Kaoru; Heng, Swee-Huay}, The security of the FDH variant of Chaum's undeniable signature scheme, 328-345 [Zbl 1081.94552] \textit{Damgård, Ivan; Dupont, Kasper}, Efficient threshold RSA signatures with general moduli and no extra assumptions, 346-361 [Zbl 1081.94548] \textit{Chen, Liqun; Malone-Lee, John}, Improved identity-based signcryption, 362-379 [Zbl 1081.94019] \textit{Baek, Joonsang; Safavi-Naini, Reihaneh; Susilo, Willy}, Efficient multi-receiver identity-based encryption and its application to broadcast encryption, 380-397 [Zbl 1081.94516] \textit{Al-Riyami, Sattam S.; Paterson, Kenneth G.}, CBE from CL-PKE: a generic construction and efficient schemes, 398-415 [Zbl 1081.94514] \textit{Dodis, Yevgeniy; Yampolskiy, Aleksandr}, A verifiable random function with short proofs and keys, 416-431 [Zbl 1081.94521]
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references