Advances in Cryptology — ASIACRYPT’98

International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 Proceedings

Editors:

ISBN: 978-3-540-65109-3 (Print) 978-3-540-49649-6 (Online)
Download Book (8,803 KB) As a courtesy to our readers the eBook is provided DRM-free. However, please note that Springer uses effective methods and state-of-the art technology to detect, stop, and prosecute illegal sharing to safeguard our authors’ interests.

Table of contents (33 chapters)

previous Page of 2
  1. Public Key Cryptosystems

    1. Book Chapter

      Pages 1-10

      Generating RSA Moduli with a Predetermined Portion

    2. Book Chapter

      Pages 11-24

      Generation of Shared RSA Keys by Two Parties

    3. Book Chapter

      Pages 25-34

      An Attack on RSA Given a Small Fraction of the Private Key Bits

    4. Book Chapter

      Pages 35-50

      C −+ * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai

  2. Invited Talk

    1. Book Chapter

      Pages 50-50

      ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture)

  3. Elliptic Curve Cryptosystems

    1. Book Chapter

      Pages 51-65

      Efficient Elliptic Curve Exponentiation Using Mixed Coordinates

    2. Book Chapter

      Pages 66-79

      Efficient Implementation of Schoof’s Algorithm

    3. Book Chapter

      Pages 80-94

      Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 n

    4. Book Chapter

      Pages 95-109

      Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings

    5. Book Chapter

      Pages 110-125

      Elliptic Curve Discrete Logarithms and the Index Calculus

  4. Cryptanalysis 1

    1. Book Chapter

      Pages 126-132

      Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers

    2. Book Chapter

      Pages 133-147

      Improved Truncated Differential Attacks on SAFER

    3. Book Chapter

      Pages 148-159

      Optimal Resistance Against the Davies and Murphy Attack

  5. Signature

    1. Book Chapter

      Pages 160-174

      A Group Signature Scheme with Improved Efficiency (Extended Abstract)

    2. Book Chapter

      Pages 175-186

      A Study on the Proposed Korean Digital Signature Algorithm

  6. Cryptanlysis 2

    1. Book Chapter

      Pages 187-199

      Cryptanalysis of the Original McEliece Cryptosystem

    2. Book Chapter

      Pages 200-213

      Improving the Security of the McEliece Public-Key Cryptosystem

    3. Book Chapter

      Pages 214-226

      Cryptanalysis in Prime Order Subgroups of Z n *

  7. Finite Automata

    1. Book Chapter

      Pages 227-241

      Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC

  8. Authentication Codes

    1. Book Chapter

      Pages 242-256

      Bounds and Constructions for Multireceiver Authentication Codes

previous Page of 2