Public Key Cryptography - PKC 2005

8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005. Proceedings

Editors:

ISBN: 978-3-540-24454-7 (Print) 978-3-540-30580-4 (Online)

Table of contents (28 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Cryptanalysis

    1. Book Chapter

      Pages 1-8

      A New Related Message Attack on RSA

    2. Book Chapter

      Pages 9-15

      Breaking a Cryptographic Protocol with Pseudoprimes

    3. Book Chapter

      Pages 16-28

      Experimenting with Faults, Lattices and the DSA

  3. Key Establishment

    1. Book Chapter

      Pages 29-46

      Securing RSA-KEM via the AES

    2. Book Chapter

      Pages 47-64

      One-Time Verifier-Based Encrypted Key Exchange

    3. Book Chapter

      Pages 65-84

      Password-Based Authenticated Key Exchange in the Three-Party Setting

  4. Optimization

    1. Book Chapter

      Pages 85-103

      On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods

    2. Book Chapter

      Pages 104-119

      Symmetric Subgroup Membership Problems

  5. Building Blocks

    1. Book Chapter

      Pages 120-137

      Optimizing Robustness While Generating Shared Secret Safe Primes

    2. Book Chapter

      Pages 138-153

      Fast Multi-computations with Integer Similarity Strategy

    3. Book Chapter

      Pages 154-171

      Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order

    4. Book Chapter

      Pages 172-183

      Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries

  6. RSA Cryptography

    1. Book Chapter

      Pages 184-198

      Converse Results to the Wiener Attack on RSA

    2. Book Chapter

      Pages 199-215

      RSA with Balanced Short Exponents and Its Application to Entity Authentication

    3. Book Chapter

      Pages 216-233

      The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity

    4. Book Chapter

      Pages 234-243

      From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited

  7. Multivariate Asymmetric Cryptography

    1. Book Chapter

      Pages 244-257

      Tractable Rational Map Signature

    2. Book Chapter

      Pages 258-274

      Cryptanalysis of the Tractable Rational Map Cryptosystem

    3. Book Chapter

      Pages 275-287

      Large Superfluous Keys in $\mathcal{M}$ ultivariate $\mathcal{Q}$ uadratic Asymmetric Systems

    4. Book Chapter

      Pages 288-301

      Cryptanalysis of HFEv and Internal Perturbation of HFE

previous Page of 2