Skip to main content
  • Conference proceedings
  • © 2000

Advances in Cryptology - CRYPTO 2000

20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1880)

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-44598-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)

This is a preview of subscription content, access via your institution.

Table of contents (33 papers)

  1. Front Matter

    Pages I-XI
  2. XTR and NTRU

    1. The XTR Public Key System

      • Arjen K. Lenstra, Eric R. Verheul
      Pages 1-19
    2. A Chosen-Ciphertext Attack against NTRU

      • Éliane Jaulmes, Antoine Joux
      Pages 20-35
  3. Privacy for Databases

    1. Privacy Preserving Data Mining

      • Yehuda Lindell, Benny Pinkas
      Pages 36-54
  4. Secure Distributed Computation and Applications

    1. Optimistic Fair Secure Computation

      • Christian Cachin, Jan Camenisch
      Pages 93-111
    2. A Cryptographic Solution to a Game Theoretic Problem

      • Yevgeniy Dodis, Shai Halevi, Tal Rabin
      Pages 112-130
  5. Algebraic Cryptosystems

    1. Differential Fault Attacks on Elliptic Curve Cryptosystems

      • Ingrid Biehl, Bernd Meyer, Volker Müller
      Pages 131-146
    2. Quantum Public-Key Cryptosystems

      • Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama
      Pages 147-165
    3. New Public-Key Cryptosystem Using Braid Groups

      • Ki Hyoung Ko, Sang Jin Lee, Jung Hee Cheon, Jae Woo Han, Ju-sung Kang, Choonsik Park
      Pages 166-183
  6. Message Authentication

    1. Key Recovery and Forgery Attacks on the MacDES MAC Algorithm

      • Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
      Pages 184-196
    2. L-collision Attacks against Randomized MACs

      • Michael Semanko
      Pages 216-228
  7. Digital Signatures

    1. On the Exact Security of Full Domain Hash

      • Jean-Sébastien Coron
      Pages 229-235
    2. Timed Commitments

      • Dan Boneh, Moni Naor
      Pages 236-254
    3. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme

      • Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
      Pages 255-270
    4. Provably Secure Partially Blind Signatures

      • Masayuki Abe, Tatsuaki Okamoto
      Pages 271-286
  8. Cryptanalysis

    1. Weaknesses in the SL2( \( \mathbb{F}_{2^n } \) ) Hashing Scheme

      • Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
      Pages 287-299
    2. Fast Correlation Attacks through Reconstruction of Linear Polynomials

      • Thomas Johansson, Fredrik Jönsson
      Pages 300-315

Keywords

  • Boolean function
  • Broadcast
  • Cryptanalysis
  • Cryptology
  • Cryptosystems
  • Data Encryption
  • Digital Payment Systems
  • Information
  • Secure Networking
  • Security
  • Signatur
  • System
  • Systems Security
  • algorithms
  • complexity
  • algorithm analysis and problem complexity

Editors and Affiliations

  • Department of Computer Science and Engineering, University of California, La Jolla, USA

    Mihir Bellare

Bibliographic Information

Buying options

eBook USD 79.99
Price excludes VAT (USA)
  • ISBN: 978-3-540-44598-2
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book USD 99.99
Price excludes VAT (USA)