close
1.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: Springer eBooks Computer Science , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
2.

図書

東工大
目次DB

図書
東工大
目次DB
Feng Bao, Robert Deng, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2947
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
3.

図書

図書
Jianying Zhou, Moti Yung, Feng Bao (eds.)
出版情報: Berlin : Springer, c2006  xiv, 488 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3989
所蔵情報: loading…
4.

図書

図書
Jianying Zhou ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 516 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3650
所蔵情報: loading…
5.

図書

図書
Robert H. Deng ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 424 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3439
所蔵情報: loading…
6.

電子ブック

EB
Jianying Zhou, Feng Bao, Takeo Kanade, Moti Yung
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2006
所蔵情報: loading…
7.

電子ブック

EB
ISC 2005, Takeo Kanade, Jianying Zhou, Robert H. Deng, Javier Lopez, Feng Bao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
8.

電子ブック

EB
ISPEC 2005, Robert Deng, Takeo Kanade, Robert H. Deng, HweeHwa Pang, Jianying Zhou, Feng Bao
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2005
所蔵情報: loading…
9.

電子ブック

EB
International Workshop on Practice and Theory in Public Key Cryptography, Feng Bao, Robert Deng, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin / Heidelberg, 2004
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA / Johannes Blömer ; Alexander May
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem / Jean-Sébastien Coron
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point / Pradeep Kumar Mishra ; Palash Sarkar
Fast Arithmetic on Jacobians of Picard Curves / Stéphane Flon ; Roger Oyono
Undeniable Signatures Based on Characters: How to Sign with One Bit / Jean Monnerat ; Serge Vaudenay
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures / Ron Steinfeld ; Huaxiong Wang ; Josef Pieprzyk
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model / Huafei Zhu
Constant Round Authenticated Group Key Agreement via Distributed Computation / Emmanuel Bresson ; Dario Catalano
Efficient ID-based Group Key Agreement with Bilinear Maps / Kyu Young Choi ; Jung Yeon Hwang ; Dong Hoon Lee
New Security Results on Encrypted Key Exchange / Olivier Chevassut ; David Pointcheval
New Results on the Hardness of Diffie-Hellman Bits / María Isabel González Vasco ; Mats Näslund ; Igor E. Shparlinski
Short Exponent Diffie-Hellman Problems / Takeshi Koshiba ; Kaoru Kurosawa
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups / Benoît Libert ; Jean-Jacques Quisquater
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" / Nicolas T. Courtois ; Reihaneh Safavi-Naini ; Luke McAven ; Moti Yung
From Digital Signature to ID-based Identification/Signature / Swee-Huay Heng
Identity-Based Threshold Decryption / Joonsang Baek ; Yuliang Zheng
An Efficient Signature Scheme from Bilinear Pairings and Its Applications / Fangguo Zhang ; Willy Susilo
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications / Ryotaro Hayashi ; Tatsuaki Okamoto ; Keisuke Tanaka
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation / Jintai Ding
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability / Jun Furukawa
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny / Brian King ; Toru Akishita ; Tsuyoshi Takagi
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? / Rui Zhang ; Goichiro Hanaoka ; Junji Shikata ; Hideki Imai
QuasiModo: Efficient Certificate Validation and Revocation / Farid F. Elwailly ; Craig Gentry ; Zulfikar Ramzan
A Distributed Online Certificate Status Protocol with a Single Public Key / Satoshi Koga ; Kouichi Sakurai
A First Approach to Provide Anonymity in Attribute Certificates / Vicente Benjumea ; Javier Lopez ; Jose A. Montenegro ; Jose M. Troya
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups / Arne Winterhof
Cryptographic Randomized Response Techniques / Andris Ambainis ; Markus Jakobsson ; Helger Lipmaa
A Correct, Private, and Efficient Mix Network / Kun Peng ; Colin Boyd ; Ed Dawson ; Kapali Viswanathan
Author Index
A Generalized Wiener Attack on RSA / Johannes Blömer ; Alexander May
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem / Jean-Sébastien Coron
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism / Roberto Maria Avanzi ; Mathieu Ciet ; Francesco Sica
10.

電子ブック

EB
International Conference on Information and Communications Security, Robert Deng, Feng Bao, Jianying Zhou
出版情報: SpringerLink Books - AutoHoldings , Springer Berlin Heidelberg, 2002
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼