Book Volume 1514 1998

Advances in Cryptology — ASIACRYPT’98

International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings


ISBN: 978-3-540-65109-3 (Print) 978-3-540-49649-6 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XII

  2. Public Key Cryptosystems

    1. Chapter

      Pages 1-10

      Generating RSA Moduli with a Predetermined Portion

    2. Chapter

      Pages 11-24

      Generation of Shared RSA Keys by Two Parties

    3. Chapter

      Pages 25-34

      An Attack on RSA Given a Small Fraction of the Private Key Bits

    4. Chapter

      Pages 35-50

      C −+ * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai

  3. Invited Talk

    1. Chapter

      Pages 50-50

      ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture)

  4. Elliptic Curve Cryptosystems

    1. Chapter

      Pages 51-65

      Efficient Elliptic Curve Exponentiation Using Mixed Coordinates

    2. Chapter

      Pages 66-79

      Efficient Implementation of Schoof’s Algorithm

    3. Chapter

      Pages 80-94

      Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 n

    4. Chapter

      Pages 95-109

      Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings

    5. Chapter

      Pages 110-125

      Elliptic Curve Discrete Logarithms and the Index Calculus

  5. Cryptanalysis 1

    1. Chapter

      Pages 126-132

      Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers

    2. Chapter

      Pages 133-147

      Improved Truncated Differential Attacks on SAFER

    3. Chapter

      Pages 148-159

      Optimal Resistance Against the Davies and Murphy Attack

  6. Signature

    1. Chapter

      Pages 160-174

      A Group Signature Scheme with Improved Efficiency (Extended Abstract)

    2. Chapter

      Pages 175-186

      A Study on the Proposed Korean Digital Signature Algorithm

  7. Cryptanlysis 2

    1. Chapter

      Pages 187-199

      Cryptanalysis of the Original McEliece Cryptosystem

    2. Chapter

      Pages 200-213

      Improving the Security of the McEliece Public-Key Cryptosystem

    3. Chapter

      Pages 214-226

      Cryptanalysis in Prime Order Subgroups of Z n *

  8. Finite Automata

    1. Chapter

      Pages 227-241

      Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC

  9. Authentication Codes

    1. Chapter

      Pages 242-256

      Bounds and Constructions for Multireceiver Authentication Codes

previous Page of 2