close
1.

図書

図書
Bruce Christianson ... [et al.] (eds.)
出版情報: Berlin : Springer, c2002  ix, 238 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2467
所蔵情報: loading…
目次情報: 続きを見る
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
Denial of Service, Address Ownership, and Early Authentication in the IPv6 World (Transcript of Discussion)
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols / William Aiello ; Steven M. Bellovin ; Matt Blaze ; Ran Canetti ; John Ioannidis ; Angelos D. Keromytis ; Omer Reingold
Efficient, DoS-Resistant, Secure Key Exchange for Internet Protocols (Transcript of Discussion)
Thwarting Timing Attacks Using ATM Networks / Geraint Price
Thwarting Timing Attacks Using ATM Networks (Transcript of Discussion)
Towards a Survivable Security Architecture for Ad-Hoc Networks / Tuomas Aura ; Silja Mäki
Towards a Survivable Security Architecture for Ad-Hoc Networks (Transcript of Discussion)
PIM Security / Dieter Gollmann
PIM Security (Transcript of Discussion)
Merkle Puzzles Revisited - Finding Matching Elements between Lists / Bruce Christianson ; David Wheeler
Merkle Puzzles Revisited (Transcript of Discussion)
Encapsulating Rules of Prudent Security Engineering (Position Paper) / Jan Jürjens
Encapsulating Rules of Prudent Security Engineering (Transcript of Discussion)
A Multi-OS Approach to Trusted Computer Systems / Hiroshi Yoshiura ; Kunihiko Miyazaki ; Shinji Itoh ; Kazuo Takaragi ; Ryoichi Sasaki
A Multi-OS Approach to Trusted Computer Systems (Transcript of Discussion)
A Proof of Non-repudiation / Giampaolo Bella ; Lawrence C. Paulson
A Proof of Non-repudiation (Transcript of Discussion) / Larry Paulson
Using Authority Certificates to Create Management Structures / Babak Sadighi Firozabadi ; Marek Sergot ; Olav Bandmann
Using Attribute Certificates for Creating Management Structures (Transcript of Discussion)
Trust Management and Whether to Delegate / Simon N. Foley
Trust Management and Whether to Delegate (Transcript of Discussion)
You Can't Take It with You (Transcript of Discussion) / Mark Lomas
Protocols Using Keys from Faulty Data
Protocols Using Keys from Faulty Data (Transcript of Discussion)
On the Negotiation of Access Control Policies / Virgil D. Gligor ; Himanshu Khurana ; Radostina K. Koleva ; Vijay G. Bharadwaj ; John S. Baras
Negotiation of Access Control Policies (Transcript of Discussion)
Intrusion-Tolerant Group Management in Enclaves (Transcript of Discussion) / Hassen Sa¿idi
Lightweight Authentication in a Mobile Network (Transcript of Discussion) / James Malcolm
Bluetooth Security - Fact or Fiction? (Transcript of Discussion) / Peter Drabwell
Concluding Discussion When Does Confidentiality Harm Security? / Chair: Bruce Christianson
The Last Word / Thucydides
Author Index
Keynote Address: Mobile Computing versus Immobile Security / Roger Needham
Experiences of Mobile IP Security (Transcript of Discussion) / Michael Roe
Denial-of-Service, Address Ownership, and Early Authentication in the IPv6 World / Pekka Nikander
2.

図書

図書
Moti Yung (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xiv, 626 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2442
所蔵情報: loading…
3.

図書

図書
Colin Boyd (ed.)
出版情報: Berlin ; New York : Springer, c2001  xi, 601 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2248
所蔵情報: loading…
目次情報: 続きを見る
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
The Modular Inversion Hidden Number Problem / Dan Boneh ; Shai Halevi ; Nick Howgrave-Graham
Human Identification
Secure Human Identification Protocols / Nicholas J. Hopper ; Manuel Blum
Invited Talk
Unbelievable Security (Matching AES Security Using Public Key Systems) / Arjen K. Lenstra
Practical Public Key Cryptography
A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4 / Siguna Müller
Computation of Discrete Logarithms in {op F}_{{2}^{607}}cEmmanuel Thomé
Speeding Up XTR / Martijn Stam
An Efficient Implementation of Braid Groups / Jae Choon Cha ; Ki Hyoung Ko ; Sang Jin Lee ; Jae Woo Han ; Jung Hee Cheon
Cryptography Based on Coding Theory
How to Achieve a McEliece-Based Digital Signature Scheme / Nicolas T. Courtois ; Matthieu Finiasz ; Nicolas Sendrier
Efficient Traitor Tracing Algorithms Using List Decoding / Alice Silverberg ; Jessica Staddon ; Judy L. Walker
Block Ciphers
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis / Makoto Sugita ; Kazukuni Kobara ; Hideki Imai
Known-IV Attacks on Triple Modes of Operation of Block Ciphers / Deukjo Hong ; Jaechul Sung ; Seokhie Hong ; Wonil Lee ; Sangjin Lee ; Jongin Lim ; Okyeon Yi
Generic Attacks on Feistel Schemes / Jacques Patarin
A Compact Rijndael Hardware Architecture with S-Box Optimization / Akashi Satoh ; Sumio Morioka ; Kohji Takano ; Seiji Munetoh
Provable Security
Provable Security of KASUMI and 3GPP Encryption Mode f8 / Ju-Sung Kang ; Sang-Uk Shin ; Dowon Hong
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices / Duncan S. Wong ; Agnes H. Chan
Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case / Emmanuel Bresson ; Olivier Chevassut ; David Pointcheval
Threshold Cryptography
Fully Distributed Threshold RSA under Standard Assumptions / Pierre-Alain Fouque
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes / Anna Lysyanskaya ; Chris Peikert
Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks
Two-Party Protocols
Oblivious Polynomial Evaluation and Oblivious Neural Learning / Yan-Cheng Chang ; Chi-Jen Lu
Mutually Independent Commitments / Moses Liskov ; Silvio Micali ; Leonid Reyzin ; Adam Smith
Zero Knowledge
Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank
Responsive Round Complexity and Concurrent Zero-Knowledge / Tzafrir Cohen ; Joe Kilian ; Erez Petrank
Cryptographic Building Blocks
Practical Construction and Analysis of Pseudo-Randomness Primitives / Johan Hastad ; Mats Näslund
Autocorrelation Coefficients and Correlation Immunity of Boolean Functions / Yuriy Tarannikov ; Peter Korolev ; Anton Botev
Elliptic Curve Cryptography
An Extension of KedlayaÆs Point-Counting Algorithm to Superelliptic Curves / Pierrick Gaudry ; Nicolas Gürel
Supersingular Curves in Cryptography / Steven D. Galbraith
Short Signatures from the Weil Pairing / Ben Lynn ; Hovav Shacham
Self-Blindable Credential Certificates from the Weil Pairing / Eric R. Verheul
Anonymity
How to Leak a Secret / Ronald L. Rivest ; Adi Shamir ; Yael Tauman
Key-Privacy in Public-Key Encryption / Mihir Bellare ; Alexandra Boldyreva ; Anand Desai
Provably Secure Fair Blind Signatures with Tight Revocation / Masayuki Abe ; Miyako Ohkubo
tAuthor Index
Lattice Based Cryptography
Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 / Craig Gentry ; Jakob Jonsson ; Jacques Stern ; Michael Szydlo
On the Insecurity of a Server-Aided RSA Protocol / Phong Q. Nguyen ; Igor E. Shparlinski
4.

図書

図書
Bahram Honary (ed.)
出版情報: Berlin ; Tokyo : Springer, c2001  ix, 416 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2260
所蔵情報: loading…
目次情報: 続きを見る
A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri
On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange ; Andreas Ahrens
The Complete Weight Enumerator for Codes over <$>M_{n\times s} \ ({\rm IF}_{q})<$> / Irfan Siap
Further Improvement of Kumar-Rajagopalan-Sahai Coding Constructions for Blacklisting Problem / Maki Yoshida ; Toru Fujiwara
A Simple Soft-Input/Soft-Output Decoder for Hamming Codes / Simon Hirst ; Bahram Honary
A Technique with an Information-Theoretic Basis for Protecting Secret Data from Differential Power Attacks / Manfred von Willich
Key Recovery Attacks on MACs Based on Properties of Cryptographic APIs / Karl Brincat ; Chris J. Mitchell
The Exact Security of ECIES in the Generic Group Model / N.P. Smart
A New Ultrafast Stream Cipher Design: COS Ciphers / Eric Filiol ; Caroline Fontaine
On Rabin-Type Signatures / Marc Joye ; Jean-Jacques Quisquater
Strong Adaptive Chosen-Ciphertext Attacks with Memory Dump (or: The Importance of the Order of Decryption and Validation) / Seungjoo Kim ; Jung Hee Cheon ; Seongan Lim ; Masahiro Mambo ; Dongho Won ; Yuliang Zheng
Majority-Logic-Decodable Cyclic Arithmetic-Modular AN-Codes in 1, 2, and L Steps / F. Javier Galán-Simón ; Edgar MartÆinez-Moro ; Juan G. Tena-Ayuso
Almost-Certainly Runlength-Limiting Codes / David J.C. MacKay
Weight vs. Magnetization Enumerator for Gallager Codes / Jort van Mourik ; David Saad ; Yoshiyuki Kabashima
Graph Configurations and Decoding Performance / J.T. Paire ; P. Coulton ; P.G. Farrell
A Line Code Construction for the Adder Channel with Rates Higher than Time-Sharing / P. Benachour ; BahramHonary
The Synthesis of TD-Sequences and Their Application to Multi-functional Communication Systems / Ahmed Al-Dabbagh ; Michael Darnell
Improvement of the Delsarte Bound for t-Designs in Finite Polynomial Metric Spaces / Svetla Nikova ; Ventzislav Nikov
Statistical Properties of Digital Piecewise Linear Chaotic Maps and Their Roles in Cryptography and Pseudo-Random Coding / Shujun Li ; Qi Li ; Wenmin Li ; Xuanqin Mou ; Yuanlong Cai
The Wide Trail Design Strategy / Joan Daemen ; Vincent Rijmen
Undetachable Threshold Signatures / Niklas Borselius ; Aaron Wilson
Improving Divide and Conquer Attacks against Cryptosystems by Better Error Detection / Correction Strategies / Werner Schindler ; Francois Koeune
Key Recovery Scheme Interoperability - A Protocol for Mechanism Negotiation / Konstantinos Rantos
Unconditionally Secure Key Agreement Protocol / Cyril Prissette
An Efficient Stream Cipher Alpha1 for Mobile and Wireless Devices / N. Komninos
Investigation of Linear Codes Possessing Some Extra Properties / Viktoriya Masol
Statistical Physics of LowDensity Parity Check Error Correcting Codes / Tatsuto Murayama ; Renato Vicente
Generating Large Instances of the Gong-Harn Cryptosystem / Kenneth J. Giuliani ; Guang Gong
Lattice Attacks on RSA-Encrypted IP and TCP / P.A. Crouch ; J.H. Davenport
Spectrally Bounded Sequences, Codes, and States: Graph Constructions and Entanglement / Matthew G. Parker
Attacking the Affine Parts of SFLASH / Willi Geiselmann ; Rainer Steinwandt ; Thomas Beth
An Identity Based Encryption Scheme Based on Quadratic Residues / Clifford Cocks
Another Way of Doing RSA Cryptography in Hardware / Lejla Batina ; Geeke Muurling
Distinguishing TEA from a Random Permutation: Reduced Round Versions of TEA Do Not Have the SAC or Do Not Generate Random Numbers / Julio César Hernández ; José MarÆia Sierra ; Arturo Ribagorda ; Benjamín Ramos ; J.C. Mex-Perera
A New Search Pattern in Multiple Residue Method (MRM) and Its Importance in the Cryptanalysis of the RSA / Seyed J. Tabatabaian ; SamIkeshiro ; Murat Gumussoy ; Mungal S. Dhanda
A New Undeniable Signature Scheme Using Smart Cards / Lee Jongkook ; Ryu Shiryong ; Kim Jeungseop ; Yoo Keeyoung
Non-binary Block Inseparable Errors Control Codes / Alexandr Y. Lev ; Yuliy A. Lev ; Vyacheslav N. Okhrymenko
Cryptanalysis of Nonlinear Filter Generators with {0,1}-Metric Viterbi Decoding / Sabine Leveiller ; Joseph Boutros ; Philippe Guillot ; Gilles Zémor
Author Index
A Statistical Decoding Algorithm for General Linear Block Codes / A. Al Jabri
On the Undetected Error Probability for Shortened Hamming Codes on Channels with Memory / Christoph Lange ; Andreas Ahrens
The Complete Weight Enumerator for Codes over <$>M_{n\times s} \ ({\rm IF}_{q})<$> / Irfan Siap
5.

図書

図書
C. Pandu Rangan, Cunsheng Ding (eds.)
出版情報: Berlin : Springer, c2001  xiii, 349 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2247
所蔵情報: loading…
目次情報: 続きを見る
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi ; H. Tanaka
A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar ; P.J. Schellenberg
Incremental Hash Function Based on Pair Chaining& Modular Arithmetic Combining / B.-M. Goi ; M.U. Siddiqi ; H.-T. Chuah
Algebraic Schemes
Multiples of Primitive Polynomials over GF(2) / K.C. Gupta ; S. Maitra
Fast Generation of Cubic Irreducible Polynomials for XTR / J.M. Kim ; I. Yie ; S.I. Oh ; H.D. Kim ; J. Ryu
CheatingPrevention in Secret Sharingover GF(pt) / J. Pieprzyk ; X.-M. Zhang
Elliptic Curves
An Application of Sieve Methods to Elliptic Curves / S.A. Miri ; V.K. Murty
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet ; J.-J. Quisquater ; F. Sica
Coding Theory
Frameproof and IPP Codes / D.R. Stinson
Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini ; H. Wang ; C. Xing
Applications - I
Selective Receipt in Certified E-Mail / S. Kremer ; O. Markowitch
Spatial Domain Digital Watermarking with Buyer Authentication / D.P. Mukherjee
Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee ; K. Kim ; J. Ma
An Analysis of Integrity Services in Protocols / K. Viswanathan ; C. Boyd ; E. Dawson
Cryptanalysis
Cryptananlysis of the Nonlinear FeedForward Generator / S.S. Bedi ; N.R. Pillai
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer ; A. Menezes ; E. Teske
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef ; G. Gong
Distributed Cryptography
Robust and Secure Broadcasting / Y. Mu ; V. Varadharajan
Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan ; C.P. Rangan ; V. Kamakoti
Boolean Functions
Autocorrelation Properties of Correlation Immune Boolean Functions
On the Constructingof Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova ; Y. Tarannikov
Digital Signatures
A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh
Efficient ôon the Flyö Signature Schemes Based on Integer Factoring / T. Okamoto ; M. Tada ; A. Miyaji
Shift Registers
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha
Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim ; S. Kim ; J. Kim
Applications - II
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun ; M. Xuanqin ; C. Yuanlong
Re-dividingComplexity between Algorithms and Keys (Key Scripts) / G. Samid
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz
Author Index
Invited Lecture Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut
Hashing
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer
6.

図書

図書
Serge Vaudenay, Amr M. Youssef (eds.)
出版情報: Berlin ; Tokyo : Springer, c2001  xi, 357 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2259
所蔵情報: loading…
7.

図書

図書
David Naccache, Pascal Paillier (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xi, 383 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2274
所蔵情報: loading…
目次情報: 続きを見る
Encryption Schemes
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
On Sufficient Randomness for Secure Public-Key Cryptosystems / Takeshi Koshiba
Multi-recipient Public-Key Encryption with Shortened Ciphertext / Kaoru Kurosawa
Signature Schemes
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code / Goichiro Hanaoka ; Junji Shikata ; Yuliang Zheng ; Hideki Imai
Formal Proofs for the Security of Signcryption / Joonsang Baek ; Ron Steinfeld
A Provably Secure Restrictive Partially Blind Signature Scheme / Greg Maitland ; Colin Boyd
Protocols I
M + 1-st Price Auction Using Homomorphic Encryption / Masayuki Abe ; Koutarou Suzuki
Client/Server Tradeoffs for Online Elections / Ivan Damgard ; Mads Jurik
Self-tallying Elections and Perfect Ballot Secrecy / Aggelos Kiayias ; Moti Yung
Protocols II
Efficient 1-Out-n Oblivious Transfer Schemes / Wen-Guey Tzeng
Linear Code Implies Public-Key Traitor Tracing / Takuya Yoshida
Design and Security Analysis of Anonymous Group Identification Protocols / Chan H. Lee ; Xiaotie Deng ; Huafei Zhu
On the Security of the Threshold Scheme
Based on the Chinese Remainder Theorem / Michael Quisquater ; Bart Preneel ; Joos Vandewalle
Cryptanalysis
Solving Underdefined Systems of Multivariate Quadratic Equations / Nicolas Courtois ; Louis Goubin ; Willi Meier ; Jean-Daniel Tacier
Selective Forgery of RSA Signatures with Fixed-Pattern Padding / Arjen K. Lenstra ; Igor E. Shparlinski
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 / Kazukuni Kobara
Side Channels
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation / Roman Novak
A Combined Timing and Power Attack / Werner Schindler
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks / Tetsuya Izu
Invited Talk
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report
ECC Implementations
An Improved Method of Multiplication on Certain Elliptic Curves / Young-Ho Park ; Sangho Oh ; Sangjin Lee ; Jongin Lim ; Maenghee Sung
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves / Sangtae Jeong ; Chang Han Kim
Weierstraß Elliptic Curves and Side-Channel Attacks / Eric Brier
Applications
One-Way Cross-Trees and Their Applications / Sung-Ming Yen
RSA Key Generation with Verifiable Randomness / Ari Juels ; Jorge Guajardo
New Minimal Modified Radix-r Representation with Applications to Smart Cards
Author Index
Encryption Schemes
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
8.

図書

図書
Bart Preneel (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  x, 309 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2271
所蔵情報: loading…
目次情報: 続きを見る
Public Key Cryptography
On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski Jr.
Observability Analysis - Detecting When Improved Cryptosystems Fail / Marc Joye ; Jean-Jacques Quisquater ; Sung-Ming Yen ; Moti Yung
Efficient Hardware Implementations
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli / Colin D. Walter
Montgomery in Practice: How to Do It More Efficiently in Hardware / Lejla Batina ; Geeke Muurling
Mist: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis
An ASIC Implementation of the AES SBoxes / Johannes Wolkerstorfer ; Elisabeth Oswald ; Mario Lamberger
Public Key Cryptography: Theory
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function / Marc Fischlin
The Representation Problem Based on Factoring / Roger Fischlin
Symmetric Ciphers
Ciphers with Arbitrary Finite Domains / John Black ; Phillip Rogaway
Known Plaintext Correlation Attack against RC5 / Atsuko Miyaji ; Masao Nonaka ; Yoshinori Takii
E-Commerce and Applications
Micropayments Revisited / Silvio Micali ; Ronald L. Rivest
Proprietary Certificates / Markus Jakobsson ; Ari Juels ; Phong Q. Nguyen
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption / Giuseppe Ateniese ; Cristina Nita-Rotaru
Digital Signatures
RSA-Based Undeniable Signatures for General Moduli / Steven D. Galbraith ; Wenbo Mao ; Kenneth G. Paterson
Co-operatively Formed Group Signatures / Greg Maitland ; Colin Boyd
Transitive Signature Schemes
Homomorphic Signature Schemes / Robert Johnson ; David Molnar ; Dawn Song ; David Wagner
Public Key Encryption
GEM: A Generic Chosen-Ciphertext Secure Encryption Method / Jean-Sébastien Coron ; Helena Handschuh ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
Securing "Encryption + Proof of Knowledge" in the Random Oracle Model / Masayuki Abe
Discrete Logarithm
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture / Qi Cheng ; Shigenori Uchiyama
Secure Key-Evolving Protocols for Discrete Logarithm Schemes / Cheng-Fen Lu ; ShiuhPyng Winston Shieh
Author Index
Public Key Cryptography
On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski Jr.
Observability Analysis - Detecting When Improved Cryptosystems Fail / Marc Joye ; Jean-Jacques Quisquater ; Sung-Ming Yen ; Moti Yung
9.

図書

図書
Birgit Pfitzmann (ed.)
出版情報: Berlin : Springer, c2001  xii, 544 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2045
所蔵情報: loading…
10.

図書

図書
David Naccache (ed.)
出版情報: Berlin : Springer, c2001  xii, 471 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2020
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼