Advances in Cryptology — CRYPTO 2000

20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20–24, 2000 Proceedings

Editors:

ISBN: 978-3-540-67907-3 (Print) 978-3-540-44598-2 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages I-XI

  2. XTR and NTRU

    1. Book Chapter

      Pages 1-19

      The XTR Public Key System

    2. Book Chapter

      Pages 20-35

      A Chosen-Ciphertext Attack against NTRU

  3. Privacy for Databases

    1. Book Chapter

      Pages 36-54

      Privacy Preserving Data Mining

    2. Book Chapter

      Pages 55-73

      Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing

  4. Secure Distributed Computation and Applications

    1. Book Chapter

      Pages 74-92

      Parallel Reducibility for Information-Theoretically Secure Computation

    2. Book Chapter

      Pages 93-111

      Optimistic Fair Secure Computation

    3. Book Chapter

      Pages 112-130

      A Cryptographic Solution to a Game Theoretic Problem

  5. Algebraic Cryptosystems

    1. Book Chapter

      Pages 131-146

      Differential Fault Attacks on Elliptic Curve Cryptosystems

    2. Book Chapter

      Pages 147-165

      Quantum Public-Key Cryptosystems

    3. Book Chapter

      Pages 166-183

      New Public-Key Cryptosystem Using Braid Groups

  6. Message Authentication

    1. Book Chapter

      Pages 184-196

      Key Recovery and Forgery Attacks on the MacDES MAC Algorithm

    2. Book Chapter

      Pages 197-215

      CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions

    3. Book Chapter

      Pages 216-228

      L-collision Attacks against Randomized MACs

  7. Digital Signatures

    1. Book Chapter

      Pages 229-235

      On the Exact Security of Full Domain Hash

    2. Book Chapter

      Pages 236-254

      Timed Commitments

    3. Book Chapter

      Pages 255-270

      A Practical and Provably Secure Coalition-Resistant Group Signature Scheme

    4. Book Chapter

      Pages 271-286

      Provably Secure Partially Blind Signatures

  8. Cryptanalysis

    1. Book Chapter

      Pages 287-299

      Weaknesses in the SL2( $ \mathbb{F}_{2^n } $ ) Hashing Scheme

    2. Book Chapter

      Pages 300-315

      Fast Correlation Attacks through Reconstruction of Linear Polynomials

  9. Traitor Tracing and Broadcast Encryption

    1. Book Chapter

      Pages 316-332

      Sequential Traitor Tracing

previous Page of 2