close
1.

図書

東工大
目次DB

図書
東工大
目次DB
Feng Bao, Robert Deng, Jianying Zhou (eds.)
出版情報: Berlin ; Tokyo : Springer, c2004  xi, 454 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2947
所蔵情報: loading…
目次情報: 続きを見る
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point Pradeep Kumar Mishra and Palash Sarkar 41
Fast Arithmetic on Jacobians of Picard Curves Stephane Flon and Roger Oyono 55
Undeniable Signatures Based on Characters: How to Sign with One Bit Jean Monnerat and Serge Vaudenay 69
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures Ron Steinfeld, Huaxiong Wang, and Josef Pieprzyk 86
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model Huafei Zhu 101
Constant Round Authenticated Group Key Agreement via Distributed Computation Emmanuel Bresson and Dario Catalano 115
Efficient ID-based Group Key Agreement with Bilinear Maps Kyu Young Choi, Jung Yeon Hwang, and Dong Hoon Lee 130
New Security Results on Encrypted Key Exchange Emmanuel Bresson, Olivier Chevassut, and David Pointcheval 145
New Results on the Hardness of Diffie-Hellman Bits Maria Isabel Gonzalez Vasco, Mats Naeslung, and Igor E. Shparlinski 159
Short Exponent Diffie-Hellman Problems Takeshi Koshiba and Kaoru Kurosawa 173
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups Benoit Libert and Jean-Jacques Quisquater 187
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2 Nicolas T. Courtois 201
Secret Exponent Attacks on RSA-type Schemes with Moduli N=Prq Alexander May 218
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures" Reihaneh Safavi-Naini, Luke McAven, and Moti Yung 231
From Digital Signature to ID-based Identification/Signature Kaoru Kurosawa and Swee-Huay Heng 248
Identity-Based Threshold Decryption Joonsang Baek and Yuliang Zheng 262
An Efficient Signature Scheme from Bilinear Pairings and Its Applications Fangguo Zhang, Reihaneh Safavi-Naini, and Willy Susilo 277
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications Ryotaro Hayashi, Tatsuaki Okamoto, and Keisuke Tanaka 291
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation Jintai Ding 305
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability Jun Furukawa 319
A Point Compression Method for Elliptic Curves Defined over GF(2n) Brian King 333
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny Toru Akishita and Tsuyoshi Takagi 346
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security? Rui Zhang, Goichiro Hanaoka, Junji Shikata, and Hideki Imai 360
QuasiModo: Efficient Certificate Validation and Revocation Farid F. Elwailly, Craig Gentry, and Zulfikar Ramzan 375
A Distributed Online Certificate Status Protocol with a Single Public Key Satoshi Koga and Kouichi Sakurai 389
A First Approach to Provide Anonymity in Attribute Certificates Vicente Benjumea, Javier Lopez, Jose A. Montenegro, and Jose M. Troya 402
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups Igor E. Shparlinski and Arne Winterhof 416
Cryptographic Randomized Response Techniques Andris Ambainis, Markus Jakobsson, and Helger Lipmaa 425
A Correct, Private, and Efficient Mix Network Kun Peng, Colin Boyd, Ed Dawson, and Kapali Viswanathan 439
Author Index 455
A Generalized Wiener Attack on RSA Johannes Bloemer and Alexander May 1
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem Jean-Sebastien Coron 14
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism Roberto Maria Avanzi, Mathieu Ciet, and Francesco Sica 28
2.

図書

図書
Jianying Zhou ... [et al.] (eds.)
出版情報: Berlin : Springer, c2005  xii, 516 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 3650
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼