Advances in Cryptology — ASIACRYPT 2000

6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

Editors:

ISBN: 978-3-540-41404-9 (Print) 978-3-540-44448-0 (Online)

Table of contents (47 chapters)

previous Page of 3
  1. Cryptanalysis I

    1. Book Chapter

      Pages 1-13

      Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers

    2. Book Chapter

      Pages 14-29

      Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt ’99

    3. Book Chapter

      Pages 30-43

      Why Textbook ElGamal and RSA Encryption Are Insecure

    4. Book Chapter

      Pages 44-57

      Cryptanalysis of the TTM Cryptosystem

    5. Book Chapter

      Pages 58-71

      Attacking and Repairing Batch Verification Schemes

  2. IACR Distinguished Lecture

    1. Book Chapter

      Pages 72-72

      Cryptography Everywhere

  3. Digital Signatures

    1. Book Chapter

      Pages 73-89

      Security of Signed ElGamal Encryption

    2. Book Chapter

      Pages 90-96

      From Fixed-Length to Arbitrary-Length RSA Padding Schemes

    3. Book Chapter

      Pages 97-115

      Towards Signature-Only Signature Schemes

    4. Book Chapter

      Pages 116-129

      A New Forward-Secure Digital Signature Scheme

    5. Book Chapter

      Pages 130-142

      Unconditionally Secure Digital Signature Schemes Admitting Transferability

  4. Protocols I

    1. Book Chapter

      Pages 143-161

      Efficient Secure Multi-party Computation

    2. Book Chapter

      Pages 162-177

      Mix and Match: Secure Function Evaluation via Ciphertexts

    3. Book Chapter

      Pages 178-191

      A Length-Invariant Hybrid Mix

    4. Book Chapter

      Pages 192-204

      Attack for Flash MIX

    5. Book Chapter

      Pages 205-219

      Distributed Oblivious Transfer

  5. Number Theoretic Algorithms

    1. Book Chapter

      Pages 220-233

      Key Improvements to XTR

    2. Book Chapter

      Pages 234-247

      Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders

    3. Book Chapter

      Pages 248-258

      Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three

    4. Book Chapter

      Pages 259-273

      Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems

previous Page of 3