Public Key Cryptography

5th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002 Paris, France, February 12–14, 2002 Proceedings

Editors:

ISBN: 978-3-540-43168-8 (Print) 978-3-540-45664-3 (Online)

Table of contents (27 chapters)

previous Page of 2
  1. Encryption Schemes

    1. Book Chapter

      Pages 1-16

      New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive

    2. Book Chapter

      Pages 17-33

      Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages

    3. Book Chapter

      Pages 34-47

      On Sufficient Randomness for Secure Public-Key Cryptosystems

    4. Book Chapter

      Pages 48-63

      Multi-recipient Public-Key Encryption with Shortened Ciphertext

  2. Signature Schemes

    1. Book Chapter

      Pages 64-79

      Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code

    2. Book Chapter

      Pages 80-98

      Formal Proofs for the Security of Signcryption

    3. Book Chapter

      Pages 99-114

      A Provably Secure Restrictive Partially Blind Signature Scheme

  3. Protocols I

    1. Book Chapter

      Pages 115-124

      M + 1-st Price Auction Using Homomorphic Encryption

    2. Book Chapter

      Pages 125-140

      Client/Server Tradeoffs for Online Elections

    3. Book Chapter

      Pages 141-158

      Self-tallying Elections and Perfect Ballot Secrecy

  4. Protocols II

    1. Book Chapter

      Pages 159-171

      Efficient 1-Out-n Oblivious Transfer Schemes

    2. Book Chapter

      Pages 172-187

      Linear Code Implies Public-Key Traitor Tracing

    3. Book Chapter

      Pages 188-198

      Design and Security Analysis of Anonymous Group Identification Protocols

    4. Book Chapter

      Pages 199-210

      On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem

  5. Cryptanalysis

    1. Book Chapter

      Pages 211-227

      Solving Underdefined Systems of Multivariate Quadratic Equations

    2. Book Chapter

      Pages 228-236

      Selective Forgery of RSA Signatures with Fixed-Pattern Padding

    3. Book Chapter

      Pages 237-251

      New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000

  6. Side Channels

    1. Book Chapter

      Pages 252-262

      SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation

    2. Book Chapter

      Pages 263-279

      A Combined Timing and Power Attack

    3. Book Chapter

      Pages 280-296

      A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks

previous Page of 2