Advances in Cryptology — CRYPTO 2000

20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20–24, 2000 Proceedings

  • Mihir Bellare
Conference proceedings CRYPTO 2000

DOI: 10.1007/3-540-44598-6

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1880)

Table of contents (33 papers)

  1. Front Matter
    Pages I-XI
  2. XTR and NTRU

    1. The XTR Public Key System
      Arjen K. Lenstra, Eric R. Verheul
      Pages 1-19
    2. A Chosen-Ciphertext Attack against NTRU
      Éliane Jaulmes, Antoine Joux
      Pages 20-35
  3. Privacy for Databases

    1. Privacy Preserving Data Mining
      Yehuda Lindell, Benny Pinkas
      Pages 36-54
  4. Secure Distributed Computation and Applications

    1. Optimistic Fair Secure Computation
      Christian Cachin, Jan Camenisch
      Pages 93-111
    2. A Cryptographic Solution to a Game Theoretic Problem
      Yevgeniy Dodis, Shai Halevi, Tal Rabin
      Pages 112-130
  5. Algebraic Cryptosystems

    1. Differential Fault Attacks on Elliptic Curve Cryptosystems
      Ingrid Biehl, Bernd Meyer, Volker Müller
      Pages 131-146
    2. Quantum Public-Key Cryptosystems
      Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama
      Pages 147-165
    3. New Public-Key Cryptosystem Using Braid Groups
      Ki Hyoung Ko, Sang Jin Lee, Jung Hee Cheon, Jae Woo Han, Ju-sung Kang, Choonsik Park
      Pages 166-183
  6. Message Authentication

    1. Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
      Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
      Pages 184-196
    2. L-collision Attacks against Randomized MACs
      Michael Semanko
      Pages 216-228
  7. Digital Signatures

    1. On the Exact Security of Full Domain Hash
      Jean-Sébastien Coron
      Pages 229-235
    2. Timed Commitments
      Dan Boneh, Moni Naor
      Pages 236-254
    3. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
      Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
      Pages 255-270
    4. Provably Secure Partially Blind Signatures
      Masayuki Abe, Tatsuaki Okamoto
      Pages 271-286
  8. Cryptanalysis

    1. Weaknesses in the SL2(\( \mathbb{F}_{2^n } \)) Hashing Scheme
      Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
      Pages 287-299
    2. Fast Correlation Attacks through Reconstruction of Linear Polynomials
      Thomas Johansson, Fredrik Jönsson
      Pages 300-315

About these proceedings


Boolean function Broadcast Cryptanalysis Cryptology Cryptosystems Data Encryption Digital Payment Systems Information Secure Networking Security Signatur System Systems Security algorithms complexity

Editors and affiliations

  • Mihir Bellare
    • 1
  1. 1.Department of Computer Science and EngineeringUniversity of CaliforniaLa JollaUSA

Bibliographic information

  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-67907-3
  • Online ISBN 978-3-540-44598-2
  • Series Print ISSN 0302-9743