Book Volume 2894 2003

Advances in Cryptology - ASIACRYPT 2003

9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30 – December 4, 2003. Proceedings


ISBN: 978-3-540-20592-0 (Print) 978-3-540-40061-5 (Online)

Table of contents (33 chapters)

previous Page of 2
  1. Front Matter

    Pages -

  2. Public Key Cryptography I

    1. Chapter

      Pages 1-18

      Chosen-Ciphertext Security without Redundancy

    2. Chapter

      Pages 19-36

      Some RSA-Based Encryption Schemes with Tight Security Reduction

    3. Chapter

      Pages 37-54

      A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications

  3. Number Theory I

    1. Chapter

      Pages 55-74

      Factoring Estimates for a 1024-Bit RSA Modulus

    2. Chapter

      Pages 75-92

      Index Calculus Attack for Hyperelliptic Curves of Small Genus

  4. Efficient Implementations

    1. Chapter

      Pages 93-110

      Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves

    2. Chapter

      Pages 111-123

      Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p x + d

    3. Chapter

      Pages 124-136

      The AGM-X 0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting

  5. Key Management and Protocols

    1. Chapter

      Pages 137-154

      Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy

    2. Chapter

      Pages 155-172

      Leakage-Resilient Authenticated Key Establishment Protocols

    3. Chapter

      Pages 173-187

      Untraceable Fair Network Payment Protocols with Off-Line TTP

  6. Hash Functions

    1. Chapter

      Pages 188-207

      Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking

    2. Chapter

      Pages 208-227

      New Parallel Domain Extenders for UOWHF

    3. Chapter

      Pages 228-245

      Cryptanalysis of 3-Pass HAVAL

  7. Group Signatures

    1. Chapter

      Pages 246-268

      Efficient Group Signatures without Trapdoors

    2. Chapter

      Pages 269-286

      Accumulating Composites and Improved Group Signing

    3. Chapter

      Pages 287-301

      Almost Uniform Density of Power Residues and the Provable Security of ESIGN

  8. Number Theory II

    1. Chapter

      Pages 302-310

      Rotations and Translations of Number Field Sieve Polynomials

    2. Chapter

      Pages 311-325

      On Class Group Computations Using the Number Field Sieve

  9. Invited Talk

    1. Chapter

      Pages 326-330

      The Secret and Beauty of Ancient Chinese Padlocks

previous Page of 2