Public Key Cryptography

Second International Workshop on Practice and Theory in Public Key Cryptography, PKC’99 Kamakura, Japan, March 1–3, 1999 Proceedings

ISBN: 978-3-540-65644-9 (Print) 978-3-540-49162-0 (Online)

Table of contents (25 chapters)

previous Page of 2
  1. Front Matter

    Pages I-IX

  2. No Access

    Book Chapter

    Pages 1-11

    A New Type of “Magic Ink” Signatures — Towards Transcript-Irrelevant Anonymity Revocation

  3. No Access

    Book Chapter

    Pages 12-28

    A New Aspect of Dual Basis for Efficient Field Arithmetic

  4. No Access

    Book Chapter

    Pages 29-42

    On the Security of Random Sources

  5. No Access

    Book Chapter

    Pages 43-52

    Anonymous Fingerprinting Based on Committed Oblivious Transfer

  6. No Access

    Book Chapter

    Pages 53-68

    How to Enhance the Security of Public-Key Encryption at Minimum Cost

  7. No Access

    Book Chapter

    Pages 69-81

    Encrypted Message Authentication by Firewalls

  8. No Access

    Book Chapter

    Pages 82-96

    A Relationship between One-Wayness and Correlation Intractability

  9. No Access

    Book Chapter

    Pages 97-111

    Message Recovery Fair Blind Signature

  10. No Access

    Book Chapter

    Pages 112-121

    On Quorum Controlled Asymmetric Proxy Re-encryption

  11. No Access

    Book Chapter

    Pages 122-135

    Mini-Cash: A Minimalistic Approach to E-Commerce

  12. No Access

    Book Chapter

    Pages 136-153

    Preserving Privacy in Distributed Delegation with Fast Certificates

  13. No Access

    Book Chapter

    Pages 154-170

    Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol

  14. No Access

    Book Chapter

    Pages 171-187

    Toward Fair International Key Escrow

  15. No Access

    Book Chapter

    Pages 188-196

    How to Copyright a Function?

  16. No Access

    Book Chapter

    Pages 197-203

    On the Security of RSA Screening

  17. No Access

    Book Chapter

    Pages 204-218

    The Effectiveness of Lattice Attacks Against Low-Exponent RSA

  18. No Access

    Book Chapter

    Pages 219-222

    A Trapdoor Permutation Equivalent to Factoring

  19. No Access

    Book Chapter

    Pages 223-234

    Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor

  20. No Access

    Book Chapter

    Pages 235-244

    Evaluating Differential Fault Analysis of Unknown Cryptosystems

  21. No Access

    Book Chapter

    Pages 245-262

    Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project

previous Page of 2