Advances in Cryptology — EUROCRYPT 2000

International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14–18, 2000 Proceedings

Editors:

ISBN: 978-3-540-67517-4 (Print) 978-3-540-45539-4 (Online)

Table of contents (41 chapters)

previous Page of 3
  1. Factoring and Discrete Logarithm

    1. Book Chapter

      Pages 1-18

      Factorization of a 512-Bit RSA Modulus

    2. Book Chapter

      Pages 19-34

      An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves

    3. Book Chapter

      Pages 35-52

      Analysis and Optimization of the TWINKLE Factoring Device

  2. Cryptanalysis I: Digital Signatures

    1. Book Chapter

      Pages 53-69

      Noisy Polynomial Interpolation and Noisy Chinese Remaindering

    2. Book Chapter

      Pages 70-80

      A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme

    3. Book Chapter

      Pages 81-90

      Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1

    4. Book Chapter

      Pages 91-101

      Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme

  3. Invited Talk

    1. Book Chapter

      Pages 102-103

      On the Security of 3GPP Networks

  4. Private Information Retrieval

    1. Book Chapter

      Pages 104-121

      One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval

    2. Book Chapter

      Pages 122-138

      Single Database Private Information Retrieval Implies Oblivious Transfer

  5. Key Management Protocols

    1. Book Chapter

      Pages 139-155

      Authenticated Key Exchange Secure against Dictionary Attacks

    2. Book Chapter

      Pages 156-171

      Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman

    3. Book Chapter

      Pages 172-189

      Fair Encryption of RSA Keys

  6. Threshold Cryptography and Digital Signatures

    1. Book Chapter

      Pages 190-206

      Computing Inverses over a Shared Secret Modulus

    2. Book Chapter

      Pages 207-220

      Practical Threshold Signatures

    3. Book Chapter

      Pages 221-242

      Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures

    4. Book Chapter

      Pages 243-258

      Confirmer Signature Schemes Secure against Adaptive Adversaries

  7. Public-Key Encryption

    1. Book Chapter

      Pages 259-274

      Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements

    2. Book Chapter

      Pages 275-288

      Using Hash Functions as a Hedge against Chosen Ciphertext Attack

  8. Quantum Cryptography

    1. Book Chapter

      Pages 289-299

      Security Aspects of Practical Quantum Cryptography

previous Page of 3