Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13--15, 2001. Proceedings (Q5930665)

From MaRDI portal
scientific article; zbMATH DE number 1590200
Language Label Description Also known as
English
Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13--15, 2001. Proceedings
scientific article; zbMATH DE number 1590200

    Statements

    Public key cryptography. 4th international workshop on practice and theory in public key cryptosystems, PKC 2001. Cheju Island, Korea, February 13--15, 2001. Proceedings (English)
    0 references
    23 April 2001
    0 references
    The articles of this volume will be reviewed individually. The preceding workshop (3rd, 2001) has been reviewed (see Zbl 0931.00050). Indexed articles: \textit{Müller, Siguna}, On the security of a Williams based public key encryption scheme, 1-18 [Zbl 0991.94044] \textit{Kobara, Kazukuni; Imai, Hideki}, Semantically secure McEliece public-key cryptosystems -- conversions for McEliece PKC --, 19-35 [Zbl 0988.94021] \textit{Kurosawa, Kaoru; Ogata, Wakaha; Matsuo, Toshihiko; Makishima, Shuichi}, IND-CCA public key schemes equivalent to factoring \(n=pq\), 36-47 [Zbl 0991.94041] \textit{Zheng, Yuliang}, Identification, signature and signcryption using high order residues modulo an RSA composite, 48-63 [Zbl 0988.94023] \textit{Lenstra, Arjen K.; Shparlinski, Igor E.}, On the security of Lenstra's variant of DSA without long inversions, 64-72 [Zbl 0993.94551] \textit{Lenstra, Arjen K.; Verheul, Eric R.}, Fast irreducibility and subgroup membership testing in XTR, 73-86 [Zbl 0991.94042] \textit{Koshiba, Takeshi}, A new aspect for security notions: Secure randomness in public key encryption schemes, 87-103 [Zbl 0989.94516] \textit{Okamoto, Tatsuaki; Pointcheval, David}, The gap-problems: A new class of problems for the security of cryptographic schemes, 104-118 [Zbl 0984.94509] \textit{Damgård, Ivan; Jurik, Mads}, A generalisation, a simplification and some applications of Paillier's probabilistic public-key system, 119-136 [Zbl 0987.94032] \textit{Kügler, Dennis; Vogt, Holger}, Marking: A privacy protecting approach against blackmailing, 137-152 [Zbl 0987.94511] \textit{Bao, Feng; Deng, Robert H.; Geiselmann, Willi; Schnorr, Claus; Steinwandt, Rainer; Wu, Hongjun}, Cryptanalysis of two sparse polynomial based public key cryptosystems, 153-164 [Zbl 0988.94510] \textit{Jaulmes, Éliane; Joux, Antoine}, Cryptanalysis of PKP: A new approach, 165-172 [Zbl 0988.94512] \textit{Wu, Hongjun; Bao, Feng; Deng, Robert H.}, Cryptanalysis of a digital signature scheme on ID-based key-sharing infrastructures, 173-179 [Zbl 0988.94520] \textit{Steinwandt, Rainer}, Loopholes in two public key cryptosystems using the modular group, 180-189 [Zbl 0991.94047] \textit{Bresson, Emmanuel; Stern, Jacques}, Efficient revocation in group signatures, 190-206 [Zbl 0993.94553] \textit{Tzeng, Wen-Guey; Tzeng, Zhi-Jia}, A public-key traitor tracing scheme with revocation using dynamic shares, 207-224 [Zbl 0996.94524] \textit{Komaki, Hirotaka; Watanabe, Yuji; Hanaoka, Goichiro; Imai, Hideki}, Efficient asymmetric self-enforcement scheme with public traceability, 225-239 [Zbl 0996.94521] \textit{Frankel, Yair; MacKenzie, Philip D.; Yung, Moti}, Adaptive security for the additive-sharing based proactive RSA, 240-263 [Zbl 0995.94540] \textit{Tzeng, Wen-Guey; Tzeng, Zhi-Jia}, Robust forward-secure schemes with proactive security. (Extended abstract), 264-276 [Zbl 0994.94524] \textit{Desmedt, Yvo; Burmester, Mike; Seberry, Jennifer}, Equitability in retroactive data confiscation versus proactive key escrow, 277-286 [Zbl 0984.94507] \textit{Young, Adam; Yung, Moti}, A PVSS as hard as discrete log and shareholder separability, 287-299 [Zbl 0994.94525] \textit{Fouque, Pierre-Alain; Stern, Jacques}, One round threshold discrete-log key generation without private channels, 300-316 [Zbl 0992.94506] \textit{Abe, Masayuki; Hoshino, Fumitaka}, Remarks on mix-network based on permutation networks, 317-324 [Zbl 0977.68031] \textit{Kim, Chong Hee; Lee, Pil Joong}, New key recovery in WAKE protocol, 325-338 [Zbl 0972.68078] \textit{Geiselmann, Willi; Lukhaub, Harald}, Redundant representation of finite fields, 339-352 [Zbl 1002.94532] \textit{Joye, Marc; Tymen, Christophe}, Compact encoding of non-adjacent forms with applications to elliptic curve cryptography, 353-364 [Zbl 0994.94522] \textit{Guajardo, Jorge; Blümel, Rainer; Krieger, Uwe; Paar, Christof}, Efficient implementation of elliptic curve cryptosystems on the TI MSP430x33x family of microcontrollers, 365-382 [Zbl 0991.94039] \textit{Jakobsson, Markus; Wetzel, Susanne}, Secure server-aided signature generation, 383-401 [Zbl 0994.94523] \textit{Ansper, Arne; Buldas, Ahto; Roos, Meelis; Willemson, Jan}, Efficient long-term validation of digital signatures, 402-415 [Zbl 0995.94549] \textit{Moshopoulos, Nikos K.; Pekmestzi, K. Z.}, A novel systolic architecture for an efficient RSA implementation, 416-421 [Zbl 0972.68079]
    0 references
    Cheju Island (Korea)
    0 references
    Workshop
    0 references
    Proceedings
    0 references
    PKC 2001
    0 references
    Public key cryptography
    0 references
    Cryptography
    0 references

    Identifiers