Public Key Cryptography – PKC 2008

11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings

Editors:

ISBN: 978-3-540-78439-5 (Print) 978-3-540-78440-1 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Session I: Algebraic and Number Theoretical Cryptanalysis (I)

    1. Book Chapter

      Pages 1-17

      Total Break of the ℓ-IC Signature Scheme

    2. Book Chapter

      Pages 18-36

      Recovering NTRU Secret Key from Inversion Oracles

    3. Book Chapter

      Pages 37-46

      Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know?

  3. Session II: Theory of Public Key Encryption

    1. Book Chapter

      Pages 47-64

      Relations Among Notions of Plaintext Awareness

    2. Book Chapter

      Pages 65-84

      Completely Non-malleable Encryption Revisited

  4. Invited Talk I

    1. Book Chapter

      Pages 85-100

      Cryptographic Test Correction

  5. Session III: Digital Signatures (I)

    1. Book Chapter

      Pages 101-120

      Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results

    2. Book Chapter

      Pages 121-140

      Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures

    3. Book Chapter

      Pages 141-161

      Proxy Signatures Secure Against Proxy Key Exposure

  6. Session IV: Identification, Broadcast and Key Agreement

    1. Book Chapter

      Pages 162-179

      Lattice-Based Identification Schemes Secure Under Active Attacks

    2. Book Chapter

      Pages 180-196

      Efficient Simultaneous Broadcast

    3. Book Chapter

      Pages 197-213

      SAS-Based Group Authentication and Key Agreement Protocols

  7. Session V: Implementation of Fast Arithmetic

    1. Book Chapter

      Pages 214-228

      An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm

    2. Book Chapter

      Pages 229-247

      New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields

  8. Session VI: Digital Signatures (II)

    1. Book Chapter

      Pages 248-267

      Online-Untransferable Signatures

    2. Book Chapter

      Pages 268-287

      Security of Digital Signature Schemes in Weakened Random Oracle Models

    3. Book Chapter

      Pages 288-307

      A Digital Signature Scheme Based on CVP  ∞ 

  9. Session VII: Algebraic and Number Theoretical Cryptanalysis (II)

    1. Book Chapter

      Pages 308-327

      An Analysis of the Vector Decomposition Problem

    2. Book Chapter

      Pages 328-343

      A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents

  10. Session VIII: Public Key Encryption

    1. Book Chapter

      Pages 344-359

      Certificateless Encryption Schemes Strongly Secure in the Standard Model

previous Page of 2