Public Key Cryptography

Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings

  • Hideki Imai
  • Yuliang Zheng
Conference proceedings PKC 2000

DOI: 10.1007/b75033

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1751)

Table of contents (31 papers)

  1. Front Matter
  2. An Efficient NICE-Schnorr-Type Signature Scheme
    Detlef Hühnlein, Johannes Merkle
    Pages 14-27
  3. Identification of Bad Signatures in Batches
    Jaroslaw Pastuszak, Dariusz Michałek, Josef Pieprzyk, Jennifer Seberry
    Pages 28-45
  4. Some Remarks on a Fair Exchange Protocol
    Jianying Zhou, Robert Deng, Feng Bao
    Pages 46-57
  5. An Identification Scheme Based on Sparse Polynomials
    William D. Banks, Daniel Lieman, Igor E. Shparlinski
    Pages 68-74
  6. A State-Based Model for Certificate Management Systems
    Chuchang Liu, Maris A. Ozols, Marie Henderson, Tony Cant
    Pages 75-92
  7. Short Proofs of Knowledge for Factoring
    Guillaume Poupard, Jacques Stern
    Pages 147-166
  8. Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms
    X. Y. Wang, L. C. Hui, K. P. Chow, W. W. Tsang, C. F. Chong, H. W. Chan
    Pages 167-177
  9. All-or-Nothing Transform and Remotely Keyed Encryption Protocols
    Sang Uk Shin, Weon Shin, Kyung Hyune Rhee
    Pages 178-195
  10. Security of Public Key Certificate Based Authentication Protocols
    Wu Wen, Takamichi Saito, Fumio Mizoguchi
    Pages 196-209
  11. Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2
    Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
    Pages 210-222
  12. Key Recovery in Third Generation Wireless Communication Systems
    Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Pages 223-237
  13. Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications
    Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
    Pages 238-257
  14. Design Validations for Discrete Logarithm Based Signature Schemes
    Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Pages 276-292

About these proceedings

Keywords

Authentication Cryptographic Protocols Digital Signatures Elliptic Curve Cryptography Public Key Cryptography Public Key Cryptosystems Shared Cryptography cryptography security

Editors and affiliations

  • Hideki Imai
    • 1
  • Yuliang Zheng
    • 2
  1. 1.National Institute of Advanced Industrial Science and Technology (AIST)Research Center for Information Security (RCIS) 
  2. 2.Department of Software & Information SystemsThe University of North Carolina at CharlotteCharlotteUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-66967-8
  • Online ISBN 978-3-540-46588-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349