Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13--15, 2001. Proceedings (Q5930665)
From MaRDI portal
scientific article; zbMATH DE number 1590200
Language | Label | Description | Also known as |
---|---|---|---|
English | Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13--15, 2001. Proceedings |
scientific article; zbMATH DE number 1590200 |
Statements
Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13--15, 2001. Proceedings (English)
0 references
23 April 2001
0 references
The articles of this volume will be reviewed individually. The preceding workshop (3rd, 2001) has been reviewed (see Zbl 0931.00050). Indexed articles: \textit{Müller, Siguna}, On the security of a Williams based public key encryption scheme, 1-18 [Zbl 0991.94044] \textit{Kobara, Kazukuni; Imai, Hideki}, Semantically secure McEliece public-key cryptosystems -- conversions for McEliece PKC --, 19-35 [Zbl 0988.94021] \textit{Kurosawa, Kaoru; Ogata, Wakaha; Matsuo, Toshihiko; Makishima, Shuichi}, IND-CCA public key schemes equivalent to factoring \(n=pq\), 36-47 [Zbl 0991.94041] \textit{Zheng, Yuliang}, Identification, signature and signcryption using high order residues modulo an RSA composite, 48-63 [Zbl 0988.94023] \textit{Lenstra, Arjen K.; Shparlinski, Igor E.}, On the security of Lenstra's variant of DSA without long inversions, 64-72 [Zbl 0993.94551] \textit{Lenstra, Arjen K.; Verheul, Eric R.}, Fast irreducibility and subgroup membership testing in XTR, 73-86 [Zbl 0991.94042] \textit{Koshiba, Takeshi}, A new aspect for security notions: Secure randomness in public key encryption schemes, 87-103 [Zbl 0989.94516] \textit{Okamoto, Tatsuaki; Pointcheval, David}, The gap-problems: A new class of problems for the security of cryptographic schemes, 104-118 [Zbl 0984.94509] \textit{Damgård, Ivan; Jurik, Mads}, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, 119-136 [Zbl 0987.94032] \textit{Kügler, Dennis; Vogt, Holger}, Marking: A privacy protecting approach against blackmailing, 137-152 [Zbl 0987.94511] \textit{Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun}, Cryptanalysis of two sparse polynomial based public key cryptosystems, 153-164 [Zbl 0988.94510] \textit{Jaulmes, Éliane; Joux, Antoine}, Cryptanalysis of PKP: A new approach, 165-172 [Zbl 0988.94512] \textit{Wu, Hongjun; Bao, Feng; Deng, Robert H.}, Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructures, 173-179 [Zbl 0988.94520] \textit{Steinwandt, Rainer}, Loopholes in two public key cryptosystems using the modular group, 180-189 [Zbl 0991.94047] \textit{Bresson, Emmanuel; Stern, Jacques}, Efficient revocation in group signatures, 190-206 [Zbl 0993.94553] \textit{Tzeng, Wen-Guey; Tzeng, Zhi-Jia}, A public-key traitor tracing scheme with revocation using dynamic shares, 207-224 [Zbl 0996.94524] \textit{Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki}, Efficient asymmetric self-enforcement scheme with public traceability, 225-239 [Zbl 0996.94521] \textit{Frankel, Yair; MacKenzie, Philip D.; Yung, Moti}, Adaptive security for the additive-sharing based proactive RSA, 240-263 [Zbl 0995.94540] \textit{Tzeng, Wen-Guey; Tzeng, Zhi-Jia}, Robust forward-secure schemes with proactive security. (Extended abstract), 264-276 [Zbl 0994.94524] \textit{Desmedt, Yvo; Burmester, Mike; Seberry, Jennifer}, Equitability in retroactive data confiscation versus proactive key escrow, 277-286 [Zbl 0984.94507] \textit{Young, Adam; Yung, Moti}, A PVSS as hard as discrete log and shareholder separability, 287-299 [Zbl 0994.94525] \textit{Fouque, Pierre-Alain; Stern, Jacques}, One round threshold discrete-log key generation without private channels, 300-316 [Zbl 0992.94506] \textit{Abe, Masayuki; Hoshino, Fumitaka}, Remarks on mix-network based on permutation networks, 317-324 [Zbl 0977.68031] \textit{Kim, Chong Hee; Lee, Pil Joong}, New key recovery in WAKE protocol, 325-338 [Zbl 0972.68078] \textit{Geiselmann, Willi; Lukhaub, Harald}, Redundant representation of finite fields, 339-352 [Zbl 1002.94532] \textit{Joye, Marc; Tymen, Christophe}, Compact encoding of non-adjacent forms with applications to elliptic curve cryptography, 353-364 [Zbl 0994.94522] \textit{Guajardo, Jorge; Blümel, Rainer; Krieger, Uwe; Paar, Christof}, Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers, 365-382 [Zbl 0991.94039] \textit{Jakobsson, Markus; Wetzel, Susanne}, Secure server-aided signature generation, 383-401 [Zbl 0994.94523] \textit{Ansper, Arne; Buldas, Ahto; Roos, Meelis; Willemson, Jan}, Efficient long-term validation of digital signatures, 402-415 [Zbl 0995.94549] \textit{Moshopoulos, Nikos K.; Pekmestzi, K. Z.}, A novel systolic architecture for an efficient RSA implementation, 416-421 [Zbl 0972.68079]
0 references
Cheju Island (Korea)
0 references
Workshop
0 references
Proceedings
0 references
PKC 2001
0 references
Public key cryptography
0 references
Cryptography
0 references