The Resource Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.)
Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.)
Resource Information
The item Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005, held in Les Diablerets, Switzerland in January 2005. The 28 revised full papers presented were carefully reviewed and selected from 126 submissions. The papers are organized in topical sections on cryptanalysis, key establishment, optimization, building blocks, RSA cryptography, multivariate asymmetric cryptography, signature schemes, and identity-based cryptography
- Language
- eng
- Extent
- 1 online resource (xiii, 431 pages)
- Contents
-
- Cryptanalysis
- A New Related Message Attack on RSA
- Breaking a Cryptographic Protocol with Pseudoprimes
- Experimenting with Faults, Lattices and the DSA
- Key Establishment
- Securing RSA-KEM via the AES
- One-Time Verifier-Based Encrypted Key Exchange
- Password-Based Authenticated Key Exchange in the Three-Party Setting
- Optimization
- On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
- Symmetric Subgroup Membership Problems
- Building Blocks
- Optimizing Robustness While Generating Shared Secret Safe Primes
- Fast Multi-computations with Integer Similarity Strategy
- Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order
- Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries
- RSA Cryptography
- Converse Results to the Wiener Attack on RSA
- RSA with Balanced Short Exponents and Its Application to Entity Authentication
- The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity
- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
- Multivariate Asymmetric Cryptography
- Tractable Rational Map Signature
- Cryptanalysis of the Tractable Rational Map Cryptosystem
- Large Superfluous Keys in ultivariate uadratic Asymmetric Systems
- Cryptanalysis of HFEv and Internal Perturbation of HFE
- Signature Schemes
- A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
- Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring
- The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
- Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions
- Identity-Based Cryptography
- Improved Identity-Based Signcryption
- Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption
- CBE from CL-PKE: A Generic Construction and Efficient Schemes
- Best Paper Award
- A Verifiable Random Function with Short Proofs and Keys
- Isbn
- 9783540305804
- Label
- Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings
- Title
- Public key cryptography
- Title remainder
- PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings
- Statement of responsibility
- Serge Vaudenay (ed.)
- Title variation
-
- PKC 2005
- 8th International Workshop on Theory and Practice in Public Key Cryptography
- Eighth International Workshop on Theory and Practice in Public Key Cryptography
- International Workshop on Theory and Practice in Public Key Cryptography
- Theory and practice in public key cryptography
- Subject
-
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Cryptographie à clé publique
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Informatique
- Public key cryptography
- Public key cryptography
- Public key cryptography -- Congresses
- Public-Key-Kryptosystem -- Kongress -- Les Diablerets <2005>
- Sécurité informatique
- COMPUTERS -- Internet | Security
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 8th International Workshop on Theory and Practice in Public Key Cryptography, PKC 2005, held in Les Diablerets, Switzerland in January 2005. The 28 revised full papers presented were carefully reviewed and selected from 126 submissions. The papers are organized in topical sections on cryptanalysis, key establishment, optimization, building blocks, RSA cryptography, multivariate asymmetric cryptography, signature schemes, and identity-based cryptography
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I575 2005
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- International Workshop on Practice and Theory in Public Key Cryptography
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Vaudenay, Serge
- Series statement
- Lecture notes in computer science,
- Series volume
- 3386
- http://library.link/vocab/subjectName
-
- Computer security
- Computers
- Data encryption (Computer science)
- Public key cryptography
- COMPUTERS
- COMPUTERS
- COMPUTERS
- Informatique
- Computer security
- Computers
- Data encryption (Computer science)
- Public key cryptography
- Contrôle d'accès
- Cryptographie à clé publique
- Sécurité informatique
- Public-Key-Kryptosystem
- Label
- Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods -- Symmetric Subgroup Membership Problems -- Building Blocks -- Optimizing Robustness While Generating Shared Secret Safe Primes -- Fast Multi-computations with Integer Similarity Strategy -- Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order -- Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries -- RSA Cryptography -- Converse Results to the Wiener Attack on RSA -- RSA with Balanced Short Exponents and Its Application to Entity Authentication -- The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity -- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited -- Multivariate Asymmetric Cryptography -- Tractable Rational Map Signature -- Cryptanalysis of the Tractable Rational Map Cryptosystem -- Large Superfluous Keys in ultivariate uadratic Asymmetric Systems -- Cryptanalysis of HFEv and Internal Perturbation of HFE -- Signature Schemes -- A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible -- Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring -- The Security of the FDH Variant of Chaum's Undeniable Signature Scheme -- Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions -- Identity-Based Cryptography -- Improved Identity-Based Signcryption -- Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption -- CBE from CL-PKE: A Generic Construction and Efficient Schemes -- Best Paper Award -- A Verifiable Random Function with Short Proofs and Keys
- Control code
- 262680711
- Dimensions
- unknown
- Extent
- 1 online resource (xiii, 431 pages)
- Form of item
- online
- Isbn
- 9783540305804
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9783540224547
- 10.1007/b105124.
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24454-7
- Specific material designation
- remote
- System control number
- (OCoLC)262680711
- Label
- Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Cryptanalysis -- A New Related Message Attack on RSA -- Breaking a Cryptographic Protocol with Pseudoprimes -- Experimenting with Faults, Lattices and the DSA -- Key Establishment -- Securing RSA-KEM via the AES -- One-Time Verifier-Based Encrypted Key Exchange -- Password-Based Authenticated Key Exchange in the Three-Party Setting -- Optimization -- On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods -- Symmetric Subgroup Membership Problems -- Building Blocks -- Optimizing Robustness While Generating Shared Secret Safe Primes -- Fast Multi-computations with Integer Similarity Strategy -- Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order -- Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries -- RSA Cryptography -- Converse Results to the Wiener Attack on RSA -- RSA with Balanced Short Exponents and Its Application to Entity Authentication -- The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity -- From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited -- Multivariate Asymmetric Cryptography -- Tractable Rational Map Signature -- Cryptanalysis of the Tractable Rational Map Cryptosystem -- Large Superfluous Keys in ultivariate uadratic Asymmetric Systems -- Cryptanalysis of HFEv and Internal Perturbation of HFE -- Signature Schemes -- A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible -- Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring -- The Security of the FDH Variant of Chaum's Undeniable Signature Scheme -- Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions -- Identity-Based Cryptography -- Improved Identity-Based Signcryption -- Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption -- CBE from CL-PKE: A Generic Construction and Efficient Schemes -- Best Paper Award -- A Verifiable Random Function with Short Proofs and Keys
- Control code
- 262680711
- Dimensions
- unknown
- Extent
- 1 online resource (xiii, 431 pages)
- Form of item
- online
- Isbn
- 9783540305804
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
-
- 9783540224547
- 10.1007/b105124.
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24454-7
- Specific material designation
- remote
- System control number
- (OCoLC)262680711
Subject
- COMPUTERS -- Networking | Security
- COMPUTERS -- Security | General
- Computer security
- Computer security
- Computer security -- Congresses
- Computers -- Access control
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Contrôle d'accès
- Cryptographie à clé publique
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Informatique
- Public key cryptography
- Public key cryptography
- Public key cryptography -- Congresses
- Public-Key-Kryptosystem -- Kongress -- Les Diablerets <2005>
- Sécurité informatique
- COMPUTERS -- Internet | Security
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Public-key-cryptography--PKC-2005--8th/Ify6pqdxVp4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Public-key-cryptography--PKC-2005--8th/Ify6pqdxVp4/">Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Public-key-cryptography--PKC-2005--8th/Ify6pqdxVp4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Public-key-cryptography--PKC-2005--8th/Ify6pqdxVp4/">Public key cryptography : PKC 2005 : 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005 : proceedings, Serge Vaudenay (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>