Coverart for item
The Resource Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings, Hideki Imai, Yuliang Zheng, eds

Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings, Hideki Imai, Yuliang Zheng, eds

Label
Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings
Title
Public key cryptography
Title remainder
second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings
Statement of responsibility
Hideki Imai, Yuliang Zheng, eds
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce
Member of
Cataloging source
COO
Dewey number
005.8/2
Illustrations
illustrations
Index
index present
Language note
English
LC call number
QA76.9.A25
LC item number
I567 1999
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
1999
http://bibfra.me/vocab/lite/meetingName
International Workshop on Practice and Theory in Public Key Cryptography
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
  • 1943-
  • 1962-
http://library.link/vocab/relatedWorkOrContributorName
  • Imai, Hideki
  • Zheng, Yuliang
Series statement
Lecture notes in computer science,
Series volume
1560
http://library.link/vocab/subjectName
  • Computer security
  • Computers
  • Data encryption (Computer science)
  • Public key cryptography
  • Computer security
  • Computers
  • Data encryption (Computer science)
  • Public key cryptography
  • Cryptografie
  • Chipkaart
  • Computerbeveiliging
Label
Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings, Hideki Imai, Yuliang Zheng, eds
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
A New Type of "Magic Ink" Signatures -- Towards Transcript-Irrelevant Anonymity Revocation -- A New Aspect of Dual Basis for Efficient Field Arithmetic -- On the Security of Random Sources -- Anonymous Fingerprinting Based on Committed Oblivious Transfer -- How to Enhance the Security of Public-Key Encryption at Minimum Cost -- Encrypted Message Authentication by Firewalls -- A Relationship between One-Wayness and Correlation Intractability -- Message Recovery Fair Blind Signature -- On Quorum Controlled Asymmetric Proxy Re-encryption -- Mini-Cash: A Minimalistic Approach to E-Commerce -- Preserving Privacy in Distributed Delegation with Fast Certificates -- Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol -- Toward Fair International Key Escrow -- How to Copyright a Function? -- On the Security of RSA Screening -- The Effectiveness of Lattice Attacks Against Low-Exponent RSA -- A Trapdoor Permutation Equivalent to Factoring -- Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor -- Evaluating Differential Fault Analysis of Unknown Cryptosystems -- Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project -- Hash Functions and the MAC Using All-or-Nothing Property -- Decision Oracles are Equivalent to Matching Oracles -- Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret -- Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy -- A Secure Pay-per-View Scheme for Web-Based Video Service
Control code
619654106
Dimensions
unknown
Extent
1 online resource (ix, 326 pages)
Form of item
online
Isbn
9783540491620
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-49162-7.
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)619654106
Label
Public key cryptography : second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999 : proceedings, Hideki Imai, Yuliang Zheng, eds
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
A New Type of "Magic Ink" Signatures -- Towards Transcript-Irrelevant Anonymity Revocation -- A New Aspect of Dual Basis for Efficient Field Arithmetic -- On the Security of Random Sources -- Anonymous Fingerprinting Based on Committed Oblivious Transfer -- How to Enhance the Security of Public-Key Encryption at Minimum Cost -- Encrypted Message Authentication by Firewalls -- A Relationship between One-Wayness and Correlation Intractability -- Message Recovery Fair Blind Signature -- On Quorum Controlled Asymmetric Proxy Re-encryption -- Mini-Cash: A Minimalistic Approach to E-Commerce -- Preserving Privacy in Distributed Delegation with Fast Certificates -- Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol -- Toward Fair International Key Escrow -- How to Copyright a Function? -- On the Security of RSA Screening -- The Effectiveness of Lattice Attacks Against Low-Exponent RSA -- A Trapdoor Permutation Equivalent to Factoring -- Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor -- Evaluating Differential Fault Analysis of Unknown Cryptosystems -- Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project -- Hash Functions and the MAC Using All-or-Nothing Property -- Decision Oracles are Equivalent to Matching Oracles -- Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret -- Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy -- A Secure Pay-per-View Scheme for Web-Based Video Service
Control code
619654106
Dimensions
unknown
Extent
1 online resource (ix, 326 pages)
Form of item
online
Isbn
9783540491620
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-49162-7.
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)619654106

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...