Public Key Cryptography

First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98 Pacifico Yokohama, Japan, February 5–6, 1998 Proceedings

Editors:

ISBN: 978-3-540-64693-8 (Print) 978-3-540-69105-1 (Online)

Table of contents (22 chapters)

previous Page of 2
  1. No Access

    Book Chapter

    Pages 1-13

    Distributed public key cryptosystems

  2. No Access

    Book Chapter

    Pages 14-28

    How (not) to design RSA signature schemes

  3. No Access

    Book Chapter

    Pages 29-49

    Overview of elliptic curve cryptography

  4. No Access

    Book Chapter

    Pages 50-54

    Lattices and cryptography: An overview

  5. No Access

    Book Chapter

    Pages 55-59

    A signcryption scheme with signature directly verifiable by public key

  6. No Access

    Book Chapter

    Pages 60-71

    Guaranteed correct sharing of integer factorization with off-line shareholders

  7. No Access

    Book Chapter

    Pages 72-82

    Lower bounds on term-based divisible cash systems

  8. No Access

    Book Chapter

    Pages 83-98

    Certifying trust

  9. No Access

    Book Chapter

    Pages 99-116

    On the security of server-aided RSA protocols

  10. No Access

    Book Chapter

    Pages 117-134

    On the security of ElGamal based encryption

  11. No Access

    Book Chapter

    Pages 135-148

    An authenticated Diffie-Hellman key agreement protocol secure against active attacks

  12. No Access

    Book Chapter

    Pages 149-153

    On the security of Girault's identification scheme

  13. No Access

    Book Chapter

    Pages 154-163

    A scheme for obtaining a message from the digital multisignature

  14. No Access

    Book Chapter

    Pages 164-181

    Secure hyperelliptic cryptosystems and their performance

  15. No Access

    Book Chapter

    Pages 182-194

    A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer

  16. No Access

    Book Chapter

    Pages 195-202

    Two efficient algorithms for arithmetic of elliptic curves using Frobenius map

  17. No Access

    Book Chapter

    Pages 203-216

    Public-key cryptosystems using the modular group

  18. No Access

    Book Chapter

    Pages 217-233

    A cellular automaton based fast one-way hash function suitable for hardware implementation

  19. No Access

    Book Chapter

    Pages 234-246

    A new hash function based on MDx-family and its application to MAC

  20. No Access

    Book Chapter

    Pages 247-252

    Security issues for contactless smart cards

previous Page of 2