Public Key Cryptography - PKC 2007 (eBook, PDF)
10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings
Redaktion: Okamoto, Tatsuaki; Wang, Xiaoyun
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Public Key Cryptography - PKC 2007 (eBook, PDF)
10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings
Redaktion: Okamoto, Tatsuaki; Wang, Xiaoyun
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
![](https://bilder.buecher.de/images/aktion/tolino/tolino-select-logo.png)
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.
The 29 revised full papers presented together with two invited lectures are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 8.1MB
Andere Kunden interessierten sich auch für
- Public Key Cryptography - PKC 2006 (eBook, PDF)40,95 €
- Public Key Cryptography - PKC 2009 (eBook, PDF)40,95 €
- Public Key Cryptography - PKC 2008 (eBook, PDF)40,95 €
- Public Key Cryptography - PKC 2005 (eBook, PDF)40,95 €
- Advances in Cryptology - ASIACRYPT 2007 (eBook, PDF)73,95 €
- Public Key Cryptography - PKC 2003 (eBook, PDF)40,95 €
- Progress in Cryptology - VIETCRYPT 2006 (eBook, PDF)40,95 €
-
-
-
This book constitutes the refereed proceedings of the 10th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2007, held in Beijing, China in April 2007.
The 29 revised full papers presented together with two invited lectures are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.
The 29 revised full papers presented together with two invited lectures are organized in topical sections on signatures, cryptanalysis, protocols, multivariate cryptosystems, encryption, number theoretic techniques, and public-key infrastructure.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 498
- Erscheinungstermin: 21. Juni 2007
- Englisch
- ISBN-13: 9783540716778
- Artikelnr.: 44131827
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 498
- Erscheinungstermin: 21. Juni 2007
- Englisch
- ISBN-13: 9783540716778
- Artikelnr.: 44131827
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Tatsuaki Okamoto, NTT, Japan / Xiaoyun Wang, Tsinghua University, China
Signatures I.- Full-Domain Subgroup Hiding and Constant-Size Group Signatures.- A Direct Anonymous Attestation Scheme for Embedded Devices.- Anonymous Signatures Made Easy.- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.- Invited Talk I.- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.- Cryptanalysis.- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol.- New Chosen-Ciphertext Attacks on NTRU.- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003.- Protocols I.- Optimistic Fair Exchange in a Multi-user Setting.- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.- Knowledge-Binding Commitments with Applications in Time-Stamping.- Signatures II.- Efficient Ring Signatures Without Random Oracles.- Traceable Ring Signature.- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles.- Improved On-Line/Off-Line Threshold Signatures.- Multivariate Cryptosystems.- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.- Cryptanalysis of HFE with Internal Perturbation.- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography.- Encryption.- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman.- Parallel Key-Insulated Public Key Encryption Without Random Oracles.- Multi-bit Cryptosystems Based on Lattice Problems.- Protocols II.- Practical and Secure Solutions for Integer Comparison.- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol.- Identity-Based Traitor Tracing.- Verifiable Shuffle of Large Size Ciphertexts.- Invited Talk II.- A Survey of Single-DatabasePrivate Information Retrieval: Techniques and Applications.- Number Theoretic Techniques.- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.- Efficient Pseudorandom Generators Based on the DDH Assumption.- Fast Batch Verification of Multiple Signatures.- Public-Key Infrastructure.- A Closer Look at PKI: Security and Efficiency.- Self-Generated-Certificate Public Key Encryption Without Pairing.
Signatures I.- Full-Domain Subgroup Hiding and Constant-Size Group Signatures.- A Direct Anonymous Attestation Scheme for Embedded Devices.- Anonymous Signatures Made Easy.- On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures.- Invited Talk I.- Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions.- Cryptanalysis.- Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol.- New Chosen-Ciphertext Attacks on NTRU.- Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003.- Protocols I.- Optimistic Fair Exchange in a Multi-user Setting.- Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures.- Knowledge-Binding Commitments with Applications in Time-Stamping.- Signatures II.- Efficient Ring Signatures Without Random Oracles.- Traceable Ring Signature.- Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles.- Improved On-Line/Off-Line Threshold Signatures.- Multivariate Cryptosystems.- High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems.- Cryptanalysis of HFE with Internal Perturbation.- ?-Invertible Cycles for ultivariate uadratic ( ) Public Key Cryptography.- Encryption.- Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman.- Parallel Key-Insulated Public Key Encryption Without Random Oracles.- Multi-bit Cryptosystems Based on Lattice Problems.- Protocols II.- Practical and Secure Solutions for Integer Comparison.- Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol.- Identity-Based Traitor Tracing.- Verifiable Shuffle of Large Size Ciphertexts.- Invited Talk II.- A Survey of Single-DatabasePrivate Information Retrieval: Techniques and Applications.- Number Theoretic Techniques.- Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA.- Efficient Pseudorandom Generators Based on the DDH Assumption.- Fast Batch Verification of Multiple Signatures.- Public-Key Infrastructure.- A Closer Look at PKI: Security and Efficiency.- Self-Generated-Certificate Public Key Encryption Without Pairing.