Skip to main content
  • Conference proceedings
  • © 2000

Public Key Cryptography

Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1751)

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

This is a preview of subscription content, access via your institution.

Table of contents (31 papers)

  1. Front Matter

  2. An Efficient NICE-Schnorr-Type Signature Scheme

    • Detlef Hühnlein, Johannes Merkle
    Pages 14-27
  3. Identification of Bad Signatures in Batches

    • Jaroslaw Pastuszak, Dariusz Michałek, Josef Pieprzyk, Jennifer Seberry
    Pages 28-45
  4. Some Remarks on a Fair Exchange Protocol

    • Jianying Zhou, Robert Deng, Feng Bao
    Pages 46-57
  5. Gaudry’s Variant against C ab Curves

    • Seigo Arita
    Pages 58-67
  6. An Identification Scheme Based on Sparse Polynomials

    • William D. Banks, Daniel Lieman, Igor E. Shparlinski
    Pages 68-74
  7. A State-Based Model for Certificate Management Systems

    • Chuchang Liu, Maris A. Ozols, Marie Henderson, Tony Cant
    Pages 75-92
  8. Short Proofs of Knowledge for Factoring

    • Guillaume Poupard, Jacques Stern
    Pages 147-166
  9. Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms

    • X. Y. Wang, L. C. Hui, K. P. Chow, W. W. Tsang, C. F. Chong, H. W. Chan
    Pages 167-177
  10. All-or-Nothing Transform and Remotely Keyed Encryption Protocols

    • Sang Uk Shin, Weon Shin, Kyung Hyune Rhee
    Pages 178-195
  11. Security of Public Key Certificate Based Authentication Protocols

    • Wu Wen, Takamichi Saito, Fumio Mizoguchi
    Pages 196-209
  12. Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2

    • Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
    Pages 210-222
  13. Key Recovery in Third Generation Wireless Communication Systems

    • Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Pages 223-237
  14. Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications

    • Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
    Pages 238-257
  15. Design Validations for Discrete Logarithm Based Signature Schemes

    • Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Pages 276-292

Keywords

  • Authentication
  • Cryptographic Protocols
  • Digital Signatures
  • Elliptic Curve Cryptography
  • Public Key Cryptography
  • Public Key Cryptosystems
  • Shared Cryptography
  • cryptography
  • security
  • algorithm analysis and problem complexity

Editors and Affiliations

  • National Institute of Advanced Industrial Science and Technology (AIST), Research Center for Information Security (RCIS),  

    Hideki Imai

  • Department of Software & Information Systems, The University of North Carolina at Charlotte, Charlotte, USA

    Yuliang Zheng

Bibliographic Information

  • Book Title: Public Key Cryptography

  • Book Subtitle: Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings

  • Editors: Hideki Imai, Yuliang Zheng

  • Series Title: Lecture Notes in Computer Science

  • DOI: https://doi.org/10.1007/b75033

  • Publisher: Springer Berlin, Heidelberg

  • eBook Packages: Springer Book Archive

  • Copyright Information: Springer-Verlag Berlin Heidelberg 2000

  • Softcover ISBN: 978-3-540-66967-8Published: 05 January 2000

  • eBook ISBN: 978-3-540-46588-1Published: 23 March 2004

  • Series ISSN: 0302-9743

  • Series E-ISSN: 1611-3349

  • Edition Number: 1

  • Number of Pages: XIV, 490

  • Topics: Cryptology, Programming Techniques, Operating Systems, Algorithms, Computer Communication Networks, IT Operations

Buying options

eBook USD 39.99
Price excludes VAT (Canada)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (Canada)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions