Public key cryptography -- PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1--4, 2004. Proceedings. (Q1886043)

From MaRDI portal





scientific article; zbMATH DE number 2115456
Language Label Description Also known as
English
Public key cryptography -- PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1--4, 2004. Proceedings.
scientific article; zbMATH DE number 2115456

    Statements

    Public key cryptography -- PKC 2004. 7th international workshop on theory and practice in public key cryptography, Singapore, March 1--4, 2004. Proceedings. (English)
    0 references
    12 November 2004
    0 references
    The articles of this volume will be reviewed individually. The preceding workshop has been reviewed (see Zbl 1013.00040). Indexed articles: \textit{Blömer, Johannes; May, Alexander}, A generalized Wiener attack on RSA, 1-13 [Zbl 1198.94082] \textit{Coron, Jean-Sébastien}, Cryptanalysis of a public-key encryption scheme based on the polynomial reconstruction problem, 14-27 [Zbl 1198.94088] \textit{Avanzi, Roberto Maria; Ciet, Mathieu; Sica, Francesco}, Faster scalar multiplication on Koblitz curves combining point halving with the Frobenius endomorphism, 28-40 [Zbl 1198.94078] \textit{Mishra, Pradeep Kumar; Sarkar, Palash}, Application of Montgomery's trick to scalar multiplication for elliptic and hyperelliptic curves using a fixed base point, 41-54 [Zbl 1198.94115] \textit{Flon, Stéphane; Oyono, Roger}, Fast arithmetic on Jacobians of Picard curves, 55-68 [Zbl 1198.94093] \textit{Monnerat, Jean; Vaudenay, Serge}, Undeniable signatures based on characters: How to sign with one bit, 69-85 [Zbl 1198.94158] \textit{Steinfeld, Ron; Wang, Huaxiong; Pieprzyk, Josef}, Efficient extension of standard Schnorr/RSA signatures into universal designated-verifier signatures, 86-100 [Zbl 1198.94163] \textit{Zhu, Huafei}, Constructing committed signatures from strong-RSA assumption in the standard complexity model, 101-114 [Zbl 1198.94171] \textit{Bresson, Emmanuel; Catalano, Dario}, Constant round authenticated group key agreement via distributed computation, 115-129 [Zbl 1198.94146] \textit{Choi, Kyu Young; Hwang, Jung Yeon; Lee, Dong Hoon}, Efficient ID-based group key agreement with bilinear maps, 130-144 [Zbl 1177.94140] \textit{Bresson, Emmanuel; Chevassut, Olivier; Pointcheval, David}, New security results on encrypted key exchange, 145-158 [Zbl 1198.94085] \textit{González Vasco, María Isabel; Näslund, Mats; Shparlinski, Igor E.}, New results on the hardness of Diffie-Hellman bits, 159-172 [Zbl 1198.94095] \textit{Koshiba, Takeshi; Kurosawa, Kaoru}, Short exponent Diffie-Hellman problems, 173-186 [Zbl 1198.94105] \textit{Libert, Benoît; Quisquater, Jean-Jacques}, Efficient signcryption with key privacy from gap Diffie-Hellman groups, 187-200 [Zbl 1198.94106] \textit{Courtois, Nicolas T.}, Algebraic attacks over GF\((2^{k }\)), application to HFE challenge 2 and Sflash-v2, 201-217 [Zbl 1198.94089] \textit{May, Alexander}, Secret exponent attacks on RSA-type schemes with moduli \(N=p^rq\), 218-230 [Zbl 1198.94113] \textit{Safavi-Naini, Reihaneh; McAven, Luke; Yung, Moti}, General group authentication codes and their relation to ``unconditionally-secure signatures'', 231-247 [Zbl 1198.94161] \textit{Kurosawa, Kaoru; Heng, Swee-Huay}, From digital signature to ID-based identification/signature, 248-261 [Zbl 1198.94155] \textit{Baek, Joonsang; Zheng, Yuliang}, Identity-based threshold decryption, 262-276 [Zbl 1198.94079] \textit{Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy}, An efficient signature scheme from bilinear pairings and its applications, 277-290 [Zbl 1198.94169] \textit{Hayashi, Ryotaro; Okamoto, Tatsuaki; Tanaka, Keisuke}, An RSA family of trap-door permutations with a common domain and its applications, 291-304 [Zbl 1198.94097] \textit{Ding, Jintai}, A new variant of the Matsumoto-Imai cryptosystem through perturbation, 305-318 [Zbl 1198.94091] \textit{Furukawa, Jun}, Efficient, verifiable shuffle decryption and its requirement of unlinkability, 319-332 [Zbl 1198.94094] \textit{King, Brian}, A point compression method for elliptic curves defined over GF\((2^{n }\)), 333-345 [Zbl 1198.94103] \textit{Akishita, Toru; Takagi, Tsuyoshi}, On the optimal parameter choice for elliptic curve cryptosystems using isogeny, 346-359 [Zbl 1198.94074] \textit{Zhang, Rui; Hanaoka, Goichiro; Shikata, Junji; Imai, Hideki}, On the security of multiple encryption or CCA-security + CCA-security = CCA-security?, 360-374 [Zbl 1198.94140] \textit{Elwailly, Farid F.; Gentry, Craig; Ramzan, Zulfikar}, QuasiModo: Efficient certificate validation and revocation, 375-388 [Zbl 1198.94147] \textit{Koga, Satoshi; Sakurai, Kouichi}, A distributed online certificate status protocol with a single public key, 389-401 [Zbl 1198.94154] \textit{Benjumea, Vicente; Lopez, Javier; Montenegro, Jose A.; Troya, Jose M.}, A first approach to provide anonymity in attribute certificates, 402-415 [Zbl 1198.94144] \textit{Shparlinski, Igor E.; Winterhof, Arne}, A nonuniform algorithm for the hidden number problem in subgroups, 416-424 [Zbl 1198.11087] \textit{Ambainis, Andris; Jakobsson, Markus; Lipmaa, Helger}, Cryptographic randomized response techniques, 425-438 [Zbl 1198.94075] \textit{Peng, Kun; Boyd, Colin; Dawson, Ed; Viswanathan, Kapali}, A correct, private, and efficient mix network, 439-454 [Zbl 1198.94121]
    0 references

    Identifiers

    0 references
    0 references
    0 references
    0 references
    0 references
    0 references