Advertisement

Public Key Cryptography - PKC 2006

9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings

  • Moti Yung
  • Yevgeniy Dodis
  • Aggelos Kiayias
  • Tal Malkin

Part of the Lecture Notes in Computer Science book series (LNCS, volume 3958)

Table of contents

  1. Front Matter
  2. Cryptanalysis and Protocol Weaknesses

    1. Daniel Bleichenbacher, Alexander May
      Pages 1-13
    2. Christian Wieschebrink
      Pages 14-26
    3. Sébastien Kunz-Jacques, Gwenaëlle Martinet, Guillaume Poupard, Jacques Stern
      Pages 27-43
  3. Distributed Crypto-computing

    1. Payman Mohassel, Matthew Franklin
      Pages 44-57
    2. Chris Crutchfield, David Molnar, David Turner, David Wagner
      Pages 58-74
    3. Ivan Damgård, Rune Thorbek
      Pages 75-90
  4. Encryption Methods

    1. Benoît Chevallier-Mames, Pascal Paillier, David Pointcheval
      Pages 91-104
    2. Goichiro Hanaoka, Yumiko Hanaoka, Hideki Imai
      Pages 105-122
    3. Anna Lysyanskaya, Mira Meyerovich
      Pages 123-139
  5. Cryptographic Hash and Applications

  6. Number Theory Algorithms

    1. Christophe Doche, Thomas Icart, David R. Kohel
      Pages 191-206
    2. Daniel J. Bernstein
      Pages 207-228
  7. Pairing-Based Cryptography

  8. Cryptosystems Design and Analysis

    1. Jintai Ding, Jason E. Gower
      Pages 290-301
    2. Alexei Myasnikov, Vladimir Shpilrain, Alexander Ushakov
      Pages 302-314
    3. Frédéric Muller, Frédéric Valette
      Pages 315-329
  9. Signature and Identification

    1. Kaoru Kurosawa, Katja Schmidt-Samoa
      Pages 330-346
    2. Guomin Yang, Duncan S. Wong, Xiaotie Deng, Huaxiong Wang
      Pages 347-363
    3. Kaoru Kurosawa, Swee-Huay Heng
      Pages 364-377
  10. Authentication and Key Establishment

    1. Kristin Lauter, Anton Mityagin
      Pages 378-394
    2. Sylvain Pasini, Serge Vaudenay
      Pages 395-409
    3. Olivier Chevassut, Pierre-Alain Fouque, Pierrick Gaudry, David Pointcheval
      Pages 410-426
    4. Michel Abdalla, Emmanuel Bresson, Olivier Chevassut, David Pointcheval
      Pages 427-442
  11. Multi-party Computation

    1. Cheng-Kang Chu, Wen-Guey Tzeng
      Pages 443-457
    2. Payman Mohassel, Matthew Franklin
      Pages 458-473
  12. PKI Techniques

    1. Benoît Libert, Jean-Jacques Quisquater
      Pages 474-490
    2. Tor E. Bjørstad, Alexander W. Dent
      Pages 491-507
    3. Sherman S. M. Chow, Colin Boyd, Juan Manuel González Nieto
      Pages 508-524
    4. Isamu Teranishi, Kazue Sako
      Pages 525-542
  13. Back Matter

About these proceedings

Introduction

The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of Cr- tologic Research (IACR), and this year it was also sponsored by the Columbia University Computer Science Department as well as a number of sponsors from industry, among them: EADS and Morgan Stanley, which were golden sponsors, as well as Gemplus, NTT DoCoMo, Google, Microsoft and RSA Security, which were silver sponsors. We acknowledge the generous support of our industrial sponsors; their support was a major contributing factor to the success of this year’s PKC. PKC 2006 followed a series of very successful conferences that started in 1998in Yokohama,Japan.Further meetingswereheld successivelyinKamakura (Japan), Melbourne (Australia), Jeju Island (Korea), Paris (France), Miami (USA), Singapore and Les Diablerets (Switzerland). The conference became an IACR sponsored event (o?cially designated as an IACR workshop) in 2003 and has been sponsored by IACR continuously since then. The year 2006 found us all in New York City where the undertone of the conference was hummed in the relentless rhythm of the city that never sleeps.

Keywords

DES PKI techniques RSA attack Signcryption authentication cryptanalysis cryptographic algorithms cryptography digital signature schemes distributed crypto-computing encryption methods group key exchange identity-based encryption public key cryptography public key encryption

Editors and affiliations

  • Moti Yung
    • 1
  • Yevgeniy Dodis
    • 2
  • Aggelos Kiayias
    • 3
  • Tal Malkin
    • 4
  1. 1.Computer Science DepartmentGoogle Inc. and Columbia UniversityNew YorkUSA
  2. 2.New York UniversityUSA
  3. 3.Computer Science and EngineeringUniversity of ConnecticutStorrsUSA
  4. 4.Dept. of Computer ScienceColumbia UniversityUSA

Bibliographic information

  • DOI https://doi.org/10.1007/11745853
  • Copyright Information Springer-Verlag Berlin Heidelberg 2006
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-33851-2
  • Online ISBN 978-3-540-33852-9
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site