close
1.

図書

図書
Lars Knudsen (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xii, 545 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2332
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis I
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups / Rosario Gennaro ; Daniele Micciancio
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups / Sang Jin Lee ; Eonkyung Lee
Extending the GHS Weil Descent Attack / Steven D. Galbraith ; Florian Hess ; Nigel P. Smart
Public-Key Encryption
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption / Ronald Cramer ; Victor Shoup
Key-Insulated Public Key Cryptosystems / Yevgeniy Dodis ; Jonathan Katz ; Shouhuai Xu ; Moti Yung
On the Security of Joint Signature and Encryption / Jee Hea An ; Tal Rabin
Invited Talk
AES and the Wide Trail Design Strategy / Joan Daemen ; Vincent Rijmen
Information Theory & New Models
Indistinguishability of Random Systems / Ueli Maurer
How to Fool an Unbounded Adversary with a Short Key / Alexander Russell ; Hong Wang
Cryptography in an Unbounded Computational Model / David P. Woodruff ; Marten van Dijk
Implementational Analysis
Performance Analysis and Parallel Implementation of Dedicated Hash Functions / Junko Nakajima ; Mitsuru Matsui
Fault Injection and a Timing Channel on an Analysis Technique / John A. Clark ; Jeremy L. Jacob
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms / Young-Ho Park ; Sangtae Jeong ; Jongin Lim
Stream Ciphers
Fast Correlation Attacks: An Algorithmic Point of View / Philippe Chose ; Antoine Joux ; Michel Mitton
BDD-Based Cryptanalysis of Keystream Generators / Matthias Krause
Linear Cryptanalysis of Bluetooth Stream Cipher / Jovan Dj. Golić ; Vittorio Bagini ; Guglielmo Morgari
Digital Signatures I
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups / Ivan Damgård ; Maciej Koprowski
Optimal Security Proofs for PSS and Other Signature Schemes / Jean-Sébastien Coron
Cryptanalysis II
Cryptanalysis of SFLASH / Henri Gilbert ; Marine Minier
Cryptanalysis of the Revised NTRU Signature Scheme / Craig Gentry ; Mike Szydlo
Key Exchange
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval
Universally Composable Notions of Key Exchange and Secure Channels / Ran Canetti ; Hugo Krawczyk
On Deniability in Quantum Key Exchange / Donald Beaver
Modes of Operation
A Practice-Oriented Treatment of Pseudorandom Number Generators / Anand Desai ; Alejandro Hevia ; Yiqun Lisa Yin
A Block-Cipher Mode of Operation for Parallelizable Message Authentication / John Black ; Phillip Rogaway
Rethinking PKI: What's Trust Got to Do with It? / Stephen Kent
Digital Signatures II
Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods / Tal Malkin ; Sara Miner
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security / Michel Abdalla ; Mihir Bellare ; Chanathip Namprempre
Security Notions for Unconditionally Secure Signature Schemes / Junji Shikata ; Goichiro Hanaoka ; Yuliang Zheng ; Hideki Imai
Traitor Tracking & Id-Based Encryption
Traitor Tracing with Constant Transmission Rate / Aggelos Kiayias
Toward Hierarchical Identity-Based Encryption / Jeremy Horwitz ; Ben Lynn
Multiparty and Multicast
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch / Matthias Fitzi ; Nicolas Gisin ; Oliver von Rotz
Perfectly Secure Message Transmission Revisited / Yvo Desmedt ; Yongge Wang
Symmetric Cryptology
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis / Anne Canteaut ; Marion Videau
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS / Serge Vaudenay
Author Index
Cryptanalysis I
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups / Rosario Gennaro ; Daniele Micciancio
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups / Sang Jin Lee ; Eonkyung Lee
2.

図書

図書
Birgit Pfitzmann (ed.)
出版情報: Berlin : Springer, c2001  xii, 544 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2045
所蔵情報: loading…
3.

図書

図書
Ronald Cramer (ed.)
出版情報: Berlin ; Tokyo : Springer, c2005  xiv, 576 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3494
所蔵情報: loading…
4.

図書

図書
Kaisa Nyberg (ed.)
出版情報: Berlin ; Tokyo : Springer, c1998  x, 606 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1403
所蔵情報: loading…
5.

図書

図書
Jacques Stern (ed.)
出版情報: Berlin ; Tokyo : Springer, c1999  xii, 474 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1592
所蔵情報: loading…
6.

図書

図書
Kevin S. McCurley , Claus Dieter Ziegler (eds.)
出版情報: Berlin ; Tokyo : Springer, c1998  xix, 460 p. ; 24 cm.
シリーズ名: Lecture notes in computer science ; 1440
所蔵情報: loading…
目次情報: 続きを見る
Foreword
Preface
Conference Contents / Part I:
CRYPTO '81 / Allen Gersho
EUROCRYPT '82 / Thomas Beth
CRYPTO '82 / David Chaum ; Ronald L. Rivest ; Alan T. Sherman
EUROCRYPT '83
CRYPTO '83
EUROCRYPT '84, Thomas Beth, Norbert Cot, and Ingemar Ingemarsson
CRYPTO '84 / G. R. Blakley
EUROCRYPT '85 / Franz Pichler
CRYPTO '85 / Hugh C. Williams
EUROCRYPT '86 / Ingemar Ingemarsson
CRYPTO '86 / A. M. Odlyzko
EUROCRYPT '87 / Wyn L. Price
CRYPTO '87 / Carl Pomerance
EUROCRYPT '88 / Christof G. Günther
CRYPTO '88 / Shafi Goldwasser
EUROCRYPT '89 / Jean-Jacques Quisquater ; Joos Vandewalle
CRYPTO '89 / Gilles Brassard
EUROCRYPT '90 / Ivan B. Damgard
CRYPTO '90 / Alfred J. Menezes ; Scott A. Vanstone
EUROCRYPT '91 / Donald W. Davies
CRYPTO '91 / Joan Feigenbaum
EUROCRYPT '92 / Rainer A. Rueppel
CRYPTO '92 / Ernest F. Brickell
EUROCRYPT '93 / Tor Helleseth
CRYPTO '93 / Douglas R. Stinson
EUROCRYPT '94 / Alfredo De Santis
CRYPTO '94 / Yvo Desmedt
EUROCRYPT '95 / Louis C. Guillou
CRYPTO '95 / Don Coppersmith
EUROCRYPT '96 / Ueli Maurer
CRYPTO '96 / Neal Koblitz
EUROCRYPT '97 / Walter Fumy
CRYPTO '97 / Burt Kaliski
Indices / Part II:
List of Program Committees
Author Index
Keyword Index
Foreword
Preface
Conference Contents / Part I:
7.

図書

図書
Serge Vaudenay (ed.)
出版情報: Berlin : Springer, c2006  xiv, 611 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 4004
所蔵情報: loading…
8.

図書

図書
Bart Preneel (ed.)
出版情報: Berlin : Springer, c2000  xiii, 608 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1807
所蔵情報: loading…
目次情報: 続きを見る
Factoring and Discrete Logarithm
Factorization of a 512-Bit RSA Modulus / Stefania Cavallar ; Bruce Dodson ; Arjen K. Lenstra ; Walter Lioen ; Peter L. Montgomery ; Brian Murphy ; Herman te Riele ; Karen Aardal ; Jeff Gilchrist ; Gérard Guillerm ; Paul Leyland ; Joël Marchand ; François Morain ; Alec Muffett ; Chris ; Craig Putnam ; Paul Zimmermann
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves / Pierrick Gaudry
Analysis and Optimization of the TWINKLE Factoring Device / Adi Shamir
Cryptanalysis I: Digital Signatures
Noisy Polynomial Interpolation and Noisy Chinese Remaindering / Daniel Bleichenbacher ; Phong Q. Nguyen
A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme / François Grieu
Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1 / Marc Girault ; Jean-François Misarsky
Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme / Jean-Sébastien Coron ; David Naccache
Invited Talk
On the Security of 3GPP Networks / Michael Walker
Private Information Retrieval
One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval / Eyal Kushilevitz ; Rafail Ostrovsky
Single Database Private Information Retrieval Implies Oblivious Transfer / Giovanni Di Crescenzo ; Tal Malkin
Key Management Protocols
Authenticated Key Exchange Secure against Dictionary Attacks / Mihir Bellare ; David Pointcheval ; Phillip Rogaway
Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman / Victor Boyko ; Philip MacKenzie ; Sarvar Patel
Fair Encryption of RSA Keys / Guillaume Poupard ; Jacques Stern
Threshold Cryptography and Digital Signatures
Computing Inverses over a Shared Secret Modulus / Dario Catalano ; Rosario Gennaro ; Shai Halevi
Practical Threshold Signatures / Victor Shoup
Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures / Stanisław Jarecki ; Anna Lysyanskaya
Confirmer Signature Schemes Secure against Adaptive Adversaries / Jan Camenisch ; Markus Michels
Public-Key Encryption
Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements / Alexandra Boldyreva ; Silvio Micali
Using Hash Functions as a Hedge against Chosen Ciphertext Attack
Quantum Cryptography
Security Aspects of Practical Quantum Cryptography / Gilles Brassard ; Norbert Lütkenhaus ; Tal Mor ; Barry C. Sanders
Perfectly Concealing Quantum Bit Commitment from any Quantum One-Way Permutation / Paul Dumais ; Dominic Mayers ; Louis Salvail
Multi-party Computation and Information Theory
General Secure Multi-party Computation from any Linear Secret-Sharing Scheme / Ronald Cramer ; Ivan Damgård ; Ueli Maurer
Minimal-Latency Secure Function Evaluation / Donald Beaver
Information-Theoretic Key Agreement: From Weak to Strong Secrecy for Free / Stefan Wolf
Cryptanalysis II: Public-Key Encryption
New Attacks on PKCS#1 v1.5 Encryption / Marc Joye ; Pascal Paillier
A NICE Cryptanalysis / Éliane Jaulmes ; Antoine Joux
Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations / Nicolas Courtois ; Alexander Klimov ; Jacques Patarin
Cryptanalysis of Patarin's 2-Round Public Key System with S Boxes (2R) / Eli Biham
Colossus and the German Lorenz Cipher - Code Breaking in WW II / Anthony E Sale
Zero-Knowledge
Efficient Concurrent Zero-Knowledge in the Auxiliary String Model
Efficient Proofs that a Committed Number Lies in an Interval / Fabrice Boudot
Symmetric Cryptography
A Composition Theorem for Universal One-Way Hash Functions
Exposure-Resilient Functions and All-Or-Nothing Transforms / Ran Canetti ; Yevgeniy Dodis ; Amit Sahai
The Sum of PRPs Is a Secure PRF / Stefan Lucks
Boolean Functions and Hardware
Construction of Nonlinear Boolean Functions with Important Cryptographic Properties / Palash Sarkar ; Subhamoy Maitra
Propagation Characteristics and Correlation-Immunity of Highly Nonlinear Boolean Functions / Anne Canteaut ; Claude Carlet ; Pascale Charpin ; Caroline Fontaine
Cox-Rower Architecture for Fast Parallel Montgomery Multiplication / Shinichi Kawamura ; Masanobu Koike ; Fumihiko Sano ; Atsushi Shimbo
Voting Schemes
Efficient Receipt-Free Voting Based on Homomorphic Encryption / Martin Hirt ; Kazue Sako
How to Break a Practical MIX and Design a New One / Yvo Desmedt ; Kaoru Kurosawa
Cryptanalysis III: Stream Ciphers and Block Ciphers
Improved Fast Correlation Attacks Using Parity-Check Equations of Weight 4 and 5 / Michaël Trabbia
Advanced Slide Attacks / Alex Biryukov ; David Wagner
Author Index
Factoring and Discrete Logarithm
Factorization of a 512-Bit RSA Modulus / Stefania Cavallar ; Bruce Dodson ; Arjen K. Lenstra ; Walter Lioen ; Peter L. Montgomery ; Brian Murphy ; Herman te Riele ; Karen Aardal ; Jeff Gilchrist ; Gérard Guillerm ; Paul Leyland ; Joël Marchand ; François Morain ; Alec Muffett ; Chris ; Craig Putnam ; Paul Zimmermann
An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves / Pierrick Gaudry
9.

図書

図書
Ueli Maurer, (ed.)
出版情報: Berlin ; Tokyo : Springer, c1996  xii, 416 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1070
所蔵情報: loading…
10.

図書

図書
Eli Biham (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  xiv, 648 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2656
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼