Book Volume 3958 2006

Public Key Cryptography - PKC 2006

9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings


ISBN: 978-3-540-33851-2 (Print) 978-3-540-33852-9 (Online)

Table of contents (34 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis and Protocol Weaknesses

    1. Chapter

      Pages 1-13

      New Attacks on RSA with Small Secret CRT-Exponents

    2. Chapter

      Pages 14-26

      An Attack on a Modified Niederreiter Encryption Scheme

    3. Chapter

      Pages 27-43

      Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm

  3. Distributed Crypto-computing

    1. Chapter

      Pages 44-57

      Efficient Polynomial Operations in the Shared-Coefficients Setting

    2. Chapter

      Pages 58-74

      Generic On-Line/Off-Line Threshold Signatures

    3. Chapter

      Pages 75-90

      Linear Integer Secret Sharing and Distributed Exponentiation

  4. Encryption Methods

    1. Chapter

      Pages 91-104

      Encoding-Free ElGamal Encryption Without Random Oracles

    2. Chapter

      Pages 105-122

      Parallel Key-Insulated Public Key Encryption

    3. Chapter

      Pages 123-139

      Provably Secure Steganography with Imperfect Sampling

  5. Cryptographic Hash and Applications

    1. Chapter

      Pages 140-156

      Collision-Resistant No More: Hash-and-Sign Paradigm Revisited

    2. Chapter

      Pages 157-173

      Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption

  6. Number Theory Algorithms

    1. Chapter

      Pages 174-190

      An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve

    2. Chapter

      Pages 191-206

      Efficient Scalar Multiplication by Isogeny Decompositions

    3. Chapter

      Pages 207-228

      Curve25519: New Diffie-Hellman Speed Records

  7. Pairing-Based Cryptography

    1. Chapter

      Pages 229-240

      Strongly Unforgeable Signatures Based on Computational Diffie-Hellman

    2. Chapter

      Pages 241-256

      Generalization of the Selective-ID Security Model for HIBE Protocols

    3. Chapter

      Pages 257-273

      Identity-Based Aggregate Signatures

    4. Chapter

      Pages 274-289

      On the Limitations of the Spread of an IBE-to-PKE Transformation

  8. Cryptosystems Design and Analysis

    1. Chapter

      Pages 290-301

      Inoculating Multivariate Schemes Against Differential Attacks

    2. Chapter

      Pages 302-314

      Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol

previous Page of 2