×
Loading...

Advances in cryptology--ASIACRYPT'98 : International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998 : proceedings by International Conference on the Theory a...

Book Information

TitleAdvances in cryptology--ASIACRYPT'98 : International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18-22, 1998 : proceedings
CreatorInternational Conference on the Theory and Application of Cryptology and Information Security (4th : 1998 : Beijing, China), Ohta, Kazuo, Pʻei, Ting-i
Year1998
PPI300
PublisherBerlin ; New York : Springer
LanguageEnglish
Mediatypetexts
SubjectComputer security, Data protection, Cryptography, clé accès, authentification, paiement électronique, automate fini, signature électronique, courbe elliptique, sécurité informatique, cryptographie, Sécurité informatique, Protection de l'information (Informatique), Geheimschrift, Coderingstheorie, Computerbeveiliging, Cryptographie, Protection de l'information (informatique), Computerbeveiliging, Cryptographie, Protection de l'information (informatique)
ISBN3540651098, 9783540651093
Collectionjournals_contributions, journals
Uploadersketch
Identifierspringer_10.1007-3-540-49649-1
Telegram icon Share on Telegram
Download Now

Description

Advances in Cryptology — ASIACRYPT’98: International Conference on the Theory and Application of Cryptology and Information Security Beijing, China, October 18–22, 1998 ProceedingsAuthor: Kazuo Ohta, Dingyi Pei Published by Springer Berlin Heidelberg ISBN: 978-3-540-65109-3 DOI: 10.1007/3-540-49649-1Table of Contents:Generating RSA Moduli with a Predetermined Portion Generation of Shared RSA Keys by Two Parties An Attack on RSA Given a Small Fraction of the Private Key Bits C ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture) Efficient Elliptic Curve Exponentiation Using Mixed Coordinates Efficient Implementation of Schoof’s Algorithm Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings Elliptic Curve Discrete Logarithms and the Index Calculus Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers Improved Truncated Differential Attacks on SAFER Optimal Resistance Against the Davies and Murphy Attack A Group Signature Scheme with Improved Efficiency (Extended Abstract) A Study on the Proposed Korean Digital Signature Algorithm Cryptanalysis of the Original McEliece Cryptosystem Improving the Security of the McEliece Public-Key Cryptosystem Cryptanalysis in Prime Order Subgroups of Z Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC Bounds and Constructions for Multireceiver Authentication Codes, Includes bibliographical references and index