close
1.

図書

図書
Hideki Imai, Yuliang Zheng (eds.)
出版情報: Berlin : Springer, c2000  xi, 483 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1751
所蔵情報: loading…
目次情報: 続きを見る
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
Some Remarks on a Fair Exchange Protocol / Jianying Zhou ; Robert Deng ; Feng Bao
An Identification Scheme Based on Sparse Polynomials / Seigo Arita ; William D. Banks ; Daniel Lieman ; Igor E. Shparlinski
A State-Based Model for Certificate Management Systems / Chuchang Liu ; Maris A. Ozols ; Marie Henderson ; Tony Cant
Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence / Reto Kohlas ; Ueli Maurer
The Composite Discrete Logarithm and Secure Authentication / David Pointcheval
Chosen-Ciphertext Security for Any One-Way Cryptosystem
Short Proofs of Knowledge for Factoring / Guillaume Poupard ; Jacques Stern
Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms / X.Y.Wang ; L.C.Hui ; K.P.Chow ; W.W.Tsang ; C.F.Chong ; H.W.Chan
All-or-Nothing Transform and Remotely Keyed Encryption Protocols / Sang Uk Shin ; Weon Shin ; Kyung Hyune Rhee
Security of Public Key Certificate Based Authentication Protocols / Wu Wen ; Takamichi Saito ; Fumio Mizoguchi
Efficient Implementation of Schoof's Algorithm in Case of Characteristic 2 / Tetsuya Izu ; Jun Kogure ; Kazuhiro Yokoyama
Key Recovery in Third Generation Wireless Communication Systems / Juanma González Nieto ; DongGook Park ; Colin Boyd ; Ed Dawson
Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications / Katsuyuki Okeya ; Hiroyuki Kurumatani ; Kouichi Sakurai
Certificates of Recoverability with Scalable Recovery Agent Security / Eric R. Verheul
Design Validations for Discrete Logarithm Based Signature Schemes / Ernest Brickell ; Serge Vaudenay ; Moti Yung
Optimally Efficient Accountable Time-Stamping / Ahto Buldas ; HelgerLipmaa ; Berry Schoenmakers
"Pseudorandom Intermixing": A Tool for Shared Cryptography / YairFankel ; Philip MacKenzie
RSA-Based Auto-recoverable Cryptosystems / Adam Young
Efficient and Fresh Certification / Irene Gassko ; Peter S. Gemmell
Efficient Zero-Knowledge Proofs of Knowledge Without Intractability Assumptions / Ronald Cramer ; ard
Cryptographic Approaches to Privacy in Forensic DNA Databases / Philip Bohannon ; Markus Jakobsson ; Sukamol Srikwan
Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes / Toru Inoue
An Auction Protocol Which Hides Bids of Losers / Chae Hoon Lim ; Hyo Sun Hwang ; Kazue Sako
Forward Secrecy and Its Application to Future Mobile Communications Security / Sang-Jae Moon
Selecting Cryptographic Key Sizes / Arjen K. Lenstra
A Structured ElGamal-Type Multisignature Scheme / Mike Burmester ; Yvo Desmedt ; Hiroshi Doi ; Masahiro Mambo ; Eiji Okamoto ; Mitsuru Tada ; Yuko Yoshifuji
Author Index
A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol / Wen-Guey Tzeng
An Efficient NICE-Schnorr-Type Signature Scheme / Detlef Huhnlein ; Johannes Merkle
Identification of Bad Signatures in Batches / Jaros$law Pastuszak ; Dariusz Michalek ; Josef Pieprzyk ; Jennifer Seberry
2.

図書

図書
Yvo G. Desmedt (ed.)
出版情報: Berlin ; Tokyo : Springer, c2002  xi, 364 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2567
所蔵情報: loading…
目次情報: 続きを見る
Diffie-Hellman Based Schemes
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon
Threshold Cryptography
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme / Alexandra Boldyreva
An Efficient Two-Party Public Key Cryptosystem Secure against Adaptive Chosen Ciphertext Attack / Philip MacKenzie
Reduction Proofs
On the Bit Security of NTRUEncrypt / Mats Näslund ; Igor E. Shparlinski ; William Whyte
Equivalence between Semantic Security and Indistinguishability against Chosen Ciphertext Attacks / Yodai Watanabe ; Junji Shikata ; Hideki Imai
Broadcast and Tracing
Randomness Re-use in Multi-recipient Encryption Schemes / Mihir Bellare ; Jessica Staddon
Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / Nelly Fazio
Digital Signatures
The Cramer-Shoup Strong-RSA Signature Scheme Revisited / Marc Fischlin
Strong Key-Insulated Signature Schemes / Jonathan Katz ; Shouhuai Xu ; Moti Yung
Specialized Multiparty Cryptography
A Verifiable Secret Shuffle of Homomorphic Encryptions / Jens Groth
Round-Optimal Contributory Conference Key Agreement / Colin Boyd ; Juan Manuel González Nieto
Cryptanalysis I
Security Analysis of the MORCryptosystem / Christian Tobias
A Practical Attack on Some Braid Group Based Cryptographic Primitives / Dennis Hofheinz ; Rainer Steinwandt
Elliptic Curves: Implementation Attacks
A Refined Power-Analysis Attack on Elliptic Curve Cryptosystems / Louis Goubin
Validation of Elliptic Curve Public Keys / Adrian Antipa ; Daniel Brown ; Alfred Menezes ; René Struik ; Scott Vanstone
Exceptional Procedure Attack on Elliptic Curve Cryptosystems / Tetsuya Izu ; Tsuyoshi Takagi
Implementation and Hardware Issues
A Dedicated Sieving Hardware / Martijn Stam ; Willi Geiselmann
A Fast and Secure Implementation of Sflash / Mehdi-Laurent Akkar ; Nicolas T. Courtois ; Romain Duteuil
New Public Key Schemes
A Practical Public Key Cryptosystem from Paillier and Rabin Schemes / David Galindo ; Sebastià Martín ; Paz Morillo ; Jorge L. Villar
A Lattice Based Public Key Cryptosystem Using Polynomial Representations / Seong-Hun Paeng ; Bae Eun Jung ; Kil-Chan Ha
Elliptic Curves: General Issues
The Security of DSA and ECDSA (Bypassing the Standard Elliptic Curve Certification Scheme) / Serge Vaudenay
Cryptanalysis II
Side-Channel Attacks on Textbook RSA and ElGamal Encryption / Ulrich Kuhn
On the Security of HFE, HFEv- and Quartz / Magnus Daum ; Patrick Felke
Generic Attacks and the Security of Quartz
Author Index
Diffie-Hellman Based Schemes
Efficient Construction of (Distributed) Verifiable Random Functions / Yevgeniy Dodis
An Identity-Based Signature from Gap Diffie-Hellman Groups / Jae Choon Cha ; Jung Hee Cheon
3.

図書

東工大
目次DB

図書
東工大
目次DB
Feng Bao, Robert Deng, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2947
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
4.

図書

図書
David Naccache, Pascal Paillier (eds.)
出版情報: Berlin ; Tokyo : Springer, c2002  xi, 383 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2274
所蔵情報: loading…
目次情報: 続きを見る
Encryption Schemes
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
On Sufficient Randomness for Secure Public-Key Cryptosystems / Takeshi Koshiba
Multi-recipient Public-Key Encryption with Shortened Ciphertext / Kaoru Kurosawa
Signature Schemes
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code / Goichiro Hanaoka ; Junji Shikata ; Yuliang Zheng ; Hideki Imai
Formal Proofs for the Security of Signcryption / Joonsang Baek ; Ron Steinfeld
A Provably Secure Restrictive Partially Blind Signature Scheme / Greg Maitland ; Colin Boyd
Protocols I
M + 1-st Price Auction Using Homomorphic Encryption / Masayuki Abe ; Koutarou Suzuki
Client/Server Tradeoffs for Online Elections / Ivan Damgard ; Mads Jurik
Self-tallying Elections and Perfect Ballot Secrecy / Aggelos Kiayias ; Moti Yung
Protocols II
Efficient 1-Out-n Oblivious Transfer Schemes / Wen-Guey Tzeng
Linear Code Implies Public-Key Traitor Tracing / Takuya Yoshida
Design and Security Analysis of Anonymous Group Identification Protocols / Chan H. Lee ; Xiaotie Deng ; Huafei Zhu
On the Security of the Threshold Scheme
Based on the Chinese Remainder Theorem / Michael Quisquater ; Bart Preneel ; Joos Vandewalle
Cryptanalysis
Solving Underdefined Systems of Multivariate Quadratic Equations / Nicolas Courtois ; Louis Goubin ; Willi Meier ; Jean-Daniel Tacier
Selective Forgery of RSA Signatures with Fixed-Pattern Padding / Arjen K. Lenstra ; Igor E. Shparlinski
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 / Kazukuni Kobara
Side Channels
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation / Roman Novak
A Combined Timing and Power Attack / Werner Schindler
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks / Tetsuya Izu
Invited Talk
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report
ECC Implementations
An Improved Method of Multiplication on Certain Elliptic Curves / Young-Ho Park ; Sangho Oh ; Sangjin Lee ; Jongin Lim ; Maenghee Sung
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves / Sangtae Jeong ; Chang Han Kim
Weierstraß Elliptic Curves and Side-Channel Attacks / Eric Brier
Applications
One-Way Cross-Trees and Their Applications / Sung-Ming Yen
RSA Key Generation with Verifiable Randomness / Ari Juels ; Jorge Guajardo
New Minimal Modified Radix-r Representation with Applications to Smart Cards
Author Index
Encryption Schemes
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive / Kouichi Sakurai ; Tsuyoshi Takagi
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages / Jean-Sebastien Coron ; Helena Handschuh ; Marc Joye ; Pascal Paillier ; David Pointcheval ; Christophe Tymen
5.

図書

図書
Kwangjo Kim (ed.)
出版情報: Berlin : Springer, c2001  xi, 421 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 1992
所蔵情報: loading…
6.

図書

図書
Moti Yung ... [et al.] (eds.)
出版情報: Berlin : Springer, c2006  xiv, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3958
所蔵情報: loading…
7.

図書

図書
Serge Vaudenay (ed.)
出版情報: Berlin : Springer, c2005  xiii, 431 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3386
所蔵情報: loading…
目次情報: 続きを見る
Cryptanalysis
A New Related Message Attack on RSA / Oded Yacobi ; Yacov Yacobi
Breaking a Cryptographic Protocol with Pseudoprimes / Daniel Bleichenbacher
Experimenting with Faults, Lattices and the DSA / David Naccache ; Phong Q. Nguy n ; Michael Tunstall ; Claire Whelan
Key Establishment
Securing RSA-KEM via the AES / Jakob Jonsson ; Matthew J.B. Robshaw
One-Time Verifier-Based Encrypted Key Exchange / Michel Abdalla ; Olivier Chevassut ; David Pointcheval
Password-Based Authenticated Key Exchange in the Three-Party Setting / Pierre-Alain Fouque
Optimization
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods / Werner Schindler
Symmetric Subgroup Membership Problems / Kristian Gjosteen
Building Blocks
Optimizing Robustness While Generating Shared Secret Safe Primes / Emil Ong ; John Kubiatowicz
Fast Multi-computations with Integer Similarity Strategy / Wu-Chuan Yang ; Dah-Jyh Guan ; Chi-Sung Laih
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order / Endre Bangerter ; Jan Camenisch ; Ueli Maurer
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries / Cheng-Kang Chu ; Wen-Guey Tzeng
RSA Cryptography
Converse Results to the Wiener Attack on RSA / Ron Steinfeld ; Scott Contini ; Huaxiong Wang ; Josef Pieprzyk
RSA with Balanced Short Exponents and Its Application to Entity Authentication / Hung-Min Sun ; Cheng-Ta Yang
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity / Ryotaro Hayashi ; Keisuke Tanaka
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited / Julien Cathalo ; Jean-Sébastien Coron
Multivariate Asymmetric Cryptography
Tractable Rational Map Signature / Lih-Chung Wang ; Yuh-Hua Hu ; Feipei Lai ; Chun-Yen Chou ; Bo-Yin Yang
Cryptanalysis of the Tractable Rational Map Cryptosystem / Antoine Joux ; Sébastien Kunz-Jacques ; Frédéric Muller ; Pierre-Michel Ricordel
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems / Christopher Wolf ; Bart Preneel
Cryptanalysis of HFEv and Internal Perturbation of HFE / Jintai Ding ; Dieter Schmidt
Signature Schemes
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible / Louis Granboulan
Cramer-Damgard Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring / Dario Catalano ; Rosario Gennaro
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme / Wakaha Ogata ; Kaoru Kurosawa ; Swee-Huay Heng
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions / Ivan Damgard ; Kasper Dupont
Identity-Based Cryptography
Improved Identity-Based Signcryption / Liqun Chen ; John Malone-Lee
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption / Joonsang Baek ; Reihaneh Safavi-Naini ; Willy Susilo
CBE from CL-PKE: A Generic Construction and Efficient Schemes / Sattam S. Al-Riyami ; Kenneth G. Paterson
Best Paper Award
A Verifiable Random Function with Short Proofs and Keys / Yevgeniy Dodis ; Aleksandr Yampolskiy
Author Index
Cryptanalysis
A New Related Message Attack on RSA / Oded Yacobi ; Yacov Yacobi
Breaking a Cryptographic Protocol with Pseudoprimes / Daniel Bleichenbacher
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼