Texts Books | READER Loading...

Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptograp | EUROCRYPT (2000 : Bruges, Belgium), Preneel, Bart, 1963-

Deal Score+2
Telegram icon Share on Telegram

Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptograp

User Rating: Be the first one!

Author: EUROCRYPT (2000 : Bruges, Belgium), Preneel, Bart, 1963-

Added by: sketch

Added Date: 2015-12-30

Publication Date: 2000

Language: eng

Subjects: Cryptography, Data encryption (Computer science)

Publishers: Berlin ; New York : Springer

Collections: journals contributions, journals

ISBN Number: 3540675175

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 335.90 MB

PDF Size: 5.85 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Edition: [Elektronische Ressource]

Archive Url

Downloads: 613

Views: 663

Total Files: 18

Media Type: texts

Description

Advances in Cryptology — EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14–18, 2000 Proceedings
Author: Bart Preneel
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-67517-4
DOI: 10.1007/3-540-45539-6

Table of Contents:

  • Factorization of a 512-Bit RSA Modulus
  • An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves
  • Analysis and Optimization of the TWINKLE Factoring Device
  • Noisy Polynomial Interpolation and Noisy Chinese Remaindering
  • A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme
  • Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1
  • Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme
  • On the Security of 3GPP Networks
  • One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval
  • Single Database Private Information Retrieval Implies Oblivious Transfer
  • Authenticated Key Exchange Secure against Dictionary Attacks
  • Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman
  • Fair Encryption of RSA Keys
  • Computing Inverses over a Shared Secret Modulus
  • Practical Threshold Signatures
  • Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures
  • Confirmer Signature Schemes Secure against Adaptive Adversaries
  • Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements
  • Using Hash Functions as a Hedge against Chosen Ciphertext Attack
  • Security Aspects of Practical Quantum Cryptography

Includes bibliographical references and index
READER
Logo
Compare items
  • Total (0)
Compare
0
Shopping cart