×
Loading...

Advances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :; proceedings by EUROCRYPT (2000 : Bruges, Belgium)

Book Information

TitleAdvances in cryptology : EUROCRYPT 2000 : International Conference on the Theory and Application of Cryptographic Techniques, Bruges, Belgium, May 14-18, 2000 :; proceedings
CreatorEUROCRYPT (2000 : Bruges, Belgium), Preneel, Bart, 1963-
Year2000
PPI300
PublisherBerlin ; New York : Springer
LanguageEnglish
Mediatypetexts
SubjectCryptography, Data encryption (Computer science)
ISBN3540675175
Collectionjournals_contributions, journals
Uploadersketch
Identifierspringer_10.1007-3-540-45539-6
Telegram icon Share on Telegram
Download Now

Description

Advances in Cryptology — EUROCRYPT 2000: International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14–18, 2000 ProceedingsAuthor: Bart Preneel Published by Springer Berlin Heidelberg ISBN: 978-3-540-67517-4 DOI: 10.1007/3-540-45539-6Table of Contents:Factorization of a 512-Bit RSA Modulus An Algorithm for Solving the Discrete Log Problem on Hyperelliptic Curves Analysis and Optimization of the TWINKLE Factoring Device Noisy Polynomial Interpolation and Noisy Chinese Remaindering A Chosen Messages Attack on the ISO/IEC 9796-1 Signature Scheme Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1 Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme On the Security of 3GPP Networks One-Way Trapdoor Permutations Are Sufficient for Non-trivial Single-Server Private Information Retrieval Single Database Private Information Retrieval Implies Oblivious Transfer Authenticated Key Exchange Secure against Dictionary Attacks Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman Fair Encryption of RSA Keys Computing Inverses over a Shared Secret Modulus Practical Threshold Signatures Adaptively Secure Threshold Cryptography: Introducing Concurrency, Removing Erasures Confirmer Signature Schemes Secure against Adaptive Adversaries Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements Using Hash Functions as a Hedge against Chosen Ciphertext Attack Security Aspects of Practical Quantum Cryptography, Includes bibliographical references and index