Skip to main content

Public Key Cryptography - PKC 2003

6th International Workshop on Theory and Practice in Public Key Cryptography, Miami, FL, USA, January 6-8, 2003, Proceedings

  • Conference proceedings
  • © 2002

Overview

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 2567)

Included in the following conference series:

Conference proceedings info: PKC 2003.

This is a preview of subscription content, log in via an institution to check access.

Access this book

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

Licence this eBook for your library

Institutional subscriptions

Table of contents (26 papers)

  1. Diffie-Hellman Based Schemes

  2. Reduction Proofs

  3. Broadcast and Tracing

  4. Digital Signatures

  5. Specialized Multiparty Cryptography

  6. Cryptanalysis I

  7. Elliptic Curves:Implementation Attacks

  8. Implementation and Hardware Issues

Other volumes

  1. Public Key Cryptography — PKC 2003

Keywords

About this book

PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were 105 submitted papers which were considered by the Program Committee. This is an increase of 52% compared to PKC 2002, which took place in Paris, France, February 2002, and which was incorrectly identi?ed on the cover of the proceedings as being the fourth workshop. Due to the large number of submissions, some papers that contained new ideas had to be rejected. Priority was given to novel papers. Of the 105 submissions, 26 were selected for the proceedings. These contain the revised versions of the accepted papers. Each paper was sent to at least 3 members of the program committee for comments. Revisions were not checked for correctness of their scienti?c aspects and the authors bear full responsibility for the contents of their papers. Some authors will write ?nal versions of their papers for publication in refereed journals. I am very grateful to the members of the Program Committee for their hard work in the di?cult task of selecting roughly 1 out of 4 of the submitted papers.

Editors and Affiliations

  • Department of Computer Science, Florida State University, Tallahassee, USA

    Yvo G. Desmedt

Bibliographic Information

Publish with us