Public key cryptography. 1st international workshop on Practice and theory in public key cryptography, PKC '98, Pacifico Yokohama, Japan, February 5--6, 1998. Proceedings (Q1389911)

From MaRDI portal





scientific article; zbMATH DE number 1174019
Language Label Description Also known as
English
Public key cryptography. 1st international workshop on Practice and theory in public key cryptography, PKC '98, Pacifico Yokohama, Japan, February 5--6, 1998. Proceedings
scientific article; zbMATH DE number 1174019

    Statements

    Public key cryptography. 1st international workshop on Practice and theory in public key cryptography, PKC '98, Pacifico Yokohama, Japan, February 5--6, 1998. Proceedings (English)
    0 references
    13 July 1998
    0 references
    The articles of this volume will be reviewed individually. Indexed articles: \textit{Frankel, Yair; Yung, Moti}, Distributed public key cryptosystems, 1-13 [Zbl 1067.94532] \textit{Misarsky, Jean-François}, How (not) to design RSA signature schemes, 14-28 [Zbl 1067.94553] \textit{Araki, Kiyomichi; Satoh, Takakazu; Miura, Shinji}, Overview of elliptic curve cryptography, 29-49 [Zbl 0915.94003] \textit{Stern, Jacques}, Lattices and cryptography: an overview, 50-54 [Zbl 1067.94565] \textit{Bao, Feng; Deng, Robert H.}, A signcryption scheme with signature directly verifiable by public key, 55-59 [Zbl 1067.94521] \textit{Mao, Wenbo}, Guaranteed correct sharing of integer factorization with off-line shareholders, 60-71 [Zbl 1067.94549] \textit{Okamoto, Tatsuaki; Yung, Moti}, Lower bounds on term-based divisible cash systems, 72-82 [Zbl 0903.68221] \textit{Lehti, Ilari; Nikander, Pekka}, Certifying trust, 83-98 [Zbl 0903.68071] \textit{Merkle, Johannes; Werchner, Ralph}, On the security of server-aided RSA protocols, 99-116 [Zbl 1067.94551] \textit{Tsiounis, Yiannis; Yung, Moti}, On the security of ElGamal based encryption, 117-134 [Zbl 1067.94566] \textit{Hirose, Shouichi; Yoshida, Susumu}, An authenticated Diffie-Hellman key agreement protocol secure against active attacks, 135-148 [Zbl 1067.94537] \textit{Saeednia, Shahrokh; Safavi-Naini, Rei}, On the security of Girault's identification scheme, 149-153 [Zbl 1067.94559] \textit{Chang, Chin-Chen; Leu, Jyh-Jong; Huang, Pai-Cheng; Lee, Wei-Bin}, A scheme for obtaining a message from the digital multisignature, 154-163 [Zbl 1067.94524] \textit{Sakai, Yasuyuki; Sakurai, Kouichi; Ishizuka, Hirokazu}, Secure hyperelliptic cryptosystems and their performance, 164-181 [Zbl 1067.94561] \textit{Hasegawa, Toshio; Nakajima, Junko; Matsui, Mitsuru}, A practical implementation of elliptic curve cryptosystems over GF\((p)\) on a 16-bit microcomputer, 182-194 [Zbl 1067.94534] \textit{Cheon, Jung Hee; Park, Sungmo; Park, Sangwoo; Kim, Daeho}, Two efficient algorithms for arithmetic of elliptic curves using Frobenius map, 195-202 [Zbl 0915.94004] \textit{Yamamura, Akihiro}, Public-key cryptosystems using the modular group, 203-216 [Zbl 0904.94014] \textit{Mihaljević, Miodrag; Zheng, Yuliang; Imai, Hideki}, A cellular automaton based fast one-way hash function suitable for hardware implementation, 217-233 [Zbl 1067.94552] \textit{Shin, Sang Uk; Rhee, Kyung Hyune; Ryu, Dae Hyun; Lee, Sang Jin}, A new hash function based on MDx-family and its application to MAC, 234-246 [Zbl 1067.94564] \textit{David, Michael W.; Sakurai, Kouichi}, Security issues for contactless smart cards, 247-252 [Zbl 1067.94527] \textit{Izu, Tetsuya; Kogure, Jun; Noro, Masayuki; Yokoyama, Kazuhiro}, Parameters for secure elliptic curve cryptosystem -- improvements on Schoof's algorithm, 253-257 [Zbl 1067.94540] \textit{Mambo, Masahiro; Shizuya, Hiroki}, A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme, 258-262 [Zbl 1067.94548]
    0 references
    Pacifico Yokohama (Japan)
    0 references
    Proceedings
    0 references
    Workshop
    0 references
    PKC '98
    0 references
    Public key cryptography
    0 references

    Identifiers