Book Volume 2567 2002

Public Key Cryptography — PKC 2003

6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6–8, 2003 Proceedings


ISBN: 978-3-540-00324-3 (Print) 978-3-540-36288-3 (Online)

Table of contents (26 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. Diffie-Hellman Based Schemes

    1. Chapter

      Pages 1-17

      Efficient Construction of (Distributed) Verifiable Random Functions

    2. Chapter

      Pages 18-30

      An Identity-Based Signature from Gap Diffie-Hellman Groups

  3. Threshold Cryptography

    1. Chapter

      Pages 31-46

      Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme

    2. Chapter

      Pages 47-61

      An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack

  4. Reduction Proofs

    1. Chapter

      Pages 62-70

      On the Bit Security of NTRUEncrypt

    2. Chapter

      Pages 71-84

      Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks

  5. Broadcast and Tracing

    1. Chapter

      Pages 85-99

      Randomness Re-use in Multi-recipient Encryption Schemeas

    2. Chapter

      Pages 100-115

      Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack

  6. Digital Signatures

    1. Chapter

      Pages 116-129

      The Cramer-Shoup Strong-RSA Signature Scheme Revisited

    2. Chapter

      Pages 130-144

      Strong Key-Insulated Signature Schemes

  7. Specialized Multiparty Cryptography

    1. Chapter

      Pages 145-160

      A Verifiable Secret Shuffe of Homomorphic Encryptions

    2. Chapter

      Pages 161-174

      Round-Optimal Contributory Conference Key Agreement

  8. Cryptanalysis I

    1. Chapter

      Pages 175-186

      Security Analysis of the MOR Cryptosystem

    2. Chapter

      Pages 187-198

      A Practical Attack on Some Braid Group Based Cryptographic Primitives

  9. Elliptic Curves:Implementation Attacks

    1. Chapter

      Pages 199-211

      A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems

    2. Chapter

      Pages 211-223

      Validation of Elliptic Curve Public Keys

    3. Chapter

      Pages 224-239

      Exceptional Procedure Attack on Elliptic Curve Cryptosystems

  10. Implementation and Hardware Issues

    1. Chapter

      Pages 240-254

      On Montgomery-Like Representations for Elliptic Curves over GF(2k)

    2. Chapter

      Pages 254-266

      A Dedicated Sieving Hardware

    3. Chapter

      Pages 267-278

      A Fast and Secure Implementation of Sflash

previous Page of 2