Advances in Cryptology — ASIACRYPT 2000

6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings

  • Tatsuaki Okamoto
Conference proceedings ASIACRYPT 2000
Part of the Lecture Notes in Computer Science book series (LNCS, volume 1976)

Table of contents

  1. Front Matter
    Pages I-XII
  2. Cryptanalysis I

    1. Dan Boneh, Antoine Joux, Phong Q. Nguyen
      Pages 30-43
    2. Louis Goubin, Nicolas T. Courtois
      Pages 44-57
    3. Colin Boyd, Chris Pavlovski
      Pages 58-71
  3. IACR Distinguished Lecture

    1. Thomas A. Berson
      Pages 72-72
  4. Digital Signatures

    1. Claus Peter Schnorr, Markus Jakobsson
      Pages 73-89
    2. Jean-Sébastien Coron, Francois Koeune, David Naccache
      Pages 90-96
    3. Adam Young, Moti Yung
      Pages 97-115
    4. Michel Abdalla, Leonid Reyzin
      Pages 116-129
    5. Goichiro Hanaoka, Junji Shikata, Yuliang Zheng, Hideki Imai
      Pages 130-142
  5. Protocols I

    1. Martin Hirt, Ueli Maurer, Bartosz Przydatek
      Pages 143-161
    2. Markus Jakobsson, Ari Juels
      Pages 162-177
    3. Miyako Ohkubo, Masayuki Abe
      Pages 178-191
    4. Masashi Mitomo, Kaoru Kurosawa
      Pages 192-204
    5. Moni Naor, Benny Pinkas
      Pages 205-219
  6. Number Theoretic Algorithms

About these proceedings

Introduction

ASIACRYPT 2000 was the sixth annual ASIACRYPT conference. It was sp- sored by the International Association for Cryptologic Research (IACR) in - operation with the Institute of Electronics, Information, and Communication Engineers (IEICE). The ?rst conference with the name ASIACRYPT took place in 1991, and the series of ASIACRYPT conferences were held in 1994, 1996, 1998, and 1999, in cooperation with IACR. ASIACRYPT 2000 was the ?rst conference in the series to be sponsored by IACR. The conference received 140 submissions (1 submission was withdrawn by the authors later), and the program committee selected 45 of these for presen- tion. Extended abstracts of the revised versions of these papers are included in these proceedings. The program also included two invited lectures by Thomas Berson (Cryptography Everywhere: IACR Distinguished Lecture) and Hideki Imai (CRYPTREC Project – Cryptographic Evaluation Project for the Japanese Electronic Government). Abstracts of these talks are included in these proce- ings. The conference program also included its traditional “rump session” of short, informal or impromptu presentations, kindly chaired by Moti Yung. Those p- sentations are not re?ected in these proceedings. The selection of the program was a challenging task as many high quality submissions were received. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryptography. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection.

Keywords

Cryptography RSA algorithms calculus cryptanalysis cryptographic protocools cryptology data encryption data security digital payment information security privacy security systems security verification

Editors and affiliations

  • Tatsuaki Okamoto
    • 1
  1. 1.NTT LaboratoriesNippon Telegraph and Telephone CorporationKanagawa-kenJapan

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-44448-3
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-41404-9
  • Online ISBN 978-3-540-44448-0
  • Series Print ISSN 0302-9743
  • About this book