Amazon cover image
Image from Amazon.com

Advances in cryptology : EUROCRYPT '99 : International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999 ; proceedings / Jacques Stern (ed.).

By: EUROCRYPT '99 (1999 : Prague, Czech Republic)Contributor(s): Stern, Jacques, 1949- [editor.]Material type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 1592.Publication details: Berlin ; London : Springer, ©1999. Description: 1 online resource (xii, 474 pages) : illustrationsContent type: text Media type: computer Carrier type: online resourceISBN: 9783540489108; 354048910XSubject(s): Cryptography -- Congresses | Data encryption (Computer science) -- Congresses | Cryptography | Data encryption (Computer science) | CryptografieGenre/Form: Electronic books. | Conference papers and proceedings. | Congressen (vorm) Additional physical formats: Print version:: Advances in cryptology.DDC classification: 005.82 LOC classification: QA76.9.A25 | E964 1999Other classification: 54.62 Online resources: Click here to access online
Contents:
Cryptanalysis of RSA with private key d Less than N⁰²̇⁹² / Dan Boneh and Glenn Durfee -- Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials / Eli Biham, Alex Biryukov, and Adi Shamir -- Software performance of universal hash functions / Wim Nevelsteen and Bart Preneel -- Lower bounds for oblivious transfer reductions / Yevgeniy Dodis and Silvio Micali -- On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions / Ivan Damgård, Joe Kilian, and Louis Salvail -- Conditional oblivious transfer and timed-release encryption / Giovanni Di Crescenzo, Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan -- An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack / Ran Canetti and Shafi Goldwasser -- Proving in zero-knowledge that a number is the product of two safe primes / Jan Camenisch and Markus Michels -- Secure hash-and-sign signatures without the random oracle / Rosario Gennaro, Shai Halevi, and Tal Rabin -- A note on the limits of collusion-resistant watermarks / Funda Ergun, Joe Kilian, and Ravi Kumar -- Coin-based anonymous fingerprinting / Birgit Pfitzmann and Ahmad-Reza Sadeghi -- On the performance of hyperelliptic cryptosystems / Nigel P. Smart -- Fast elliptic curve algorithm combining Frobenius map and table reference to adapt to higher characteristic / Tetsutaro Kobayashi [and others] -- Comparing the MOV and FR reductions in elliptic curve cryptography / Ryuichi Harasawa [and others] -- Unbalanced oil and vinegar signature schemes / Aviad Kipnis, Jacques Patarin, and Louis Goubin -- Public-key cryptosystems based on composite degree residuosity classes / Pascal Paillier -- New public key cryptosystems based on the dependent-RSA problems / David Pointcheval -- Resistance against general iterated attacks / Serge Vaudenay -- XOR and non-XOR differential probabilities / Philip Hawkes and Luke O'Connor -- S-boxes with controllable nonlinearity / Jung Hee Cheon, Seongtaek Chee, and Choonsik Park -- Secure distributed key generation for discrete-log based cryptosystems / Rosario Gennaro [and others] -- Efficient multiparty computations secure against an adaptive adversary / Ronald Cramer [and others] -- Distributed pseudo-random functions and KDCs / Moni Naor, Benny Pinkas, and Omer Reingold -- Improved fast correlation attacks on stream ciphers via convolutional codes / Thomas Johansson and Fredrik Jönsson -- Cryptanalysis of an identification scheme based on the permuted perceptron problem / Lars R. Knudsen and Willi Meier -- An analysis of exponentiation based on formal languages / Luke O'Connor -- Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key / Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki -- Computationally private information retrieval with polylogarithmic communication / Christian Cachin, Silvio Micali, and Markus Stadler -- On the concurrent composition of zero-knowledge proofs / Ransom Richardson and Joe Kilian -- Pseudorandom function tribe ensembles based on one-way permutations / Marc Fischlin -- Secure communication in broadcast channels / Yongge Wang and Yvo Desmedt -- Efficient communication-storage tradeoffs for multicast encryption / Ran Canetti, Tal Malkin, and Kobbi Nissim.
Summary: This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '99, held in Prague, Czech Republic in May 1999. The 32 revised full papers presented were carefully selected during highly competitive reviewing process. The book is divided in topical sections on cryptanalysis, hash functions, foundations, public key cryptosystems, watermarking and fingerprinting, elliptic curves, new schemes, block ciphers, distributed cryptography, tools from related areas, and broadcast and multicast.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

Includes bibliographical references and index.

Cryptanalysis of RSA with private key d Less than N⁰²̇⁹² / Dan Boneh and Glenn Durfee -- Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials / Eli Biham, Alex Biryukov, and Adi Shamir -- Software performance of universal hash functions / Wim Nevelsteen and Bart Preneel -- Lower bounds for oblivious transfer reductions / Yevgeniy Dodis and Silvio Micali -- On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions / Ivan Damgård, Joe Kilian, and Louis Salvail -- Conditional oblivious transfer and timed-release encryption / Giovanni Di Crescenzo, Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan -- An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack / Ran Canetti and Shafi Goldwasser -- Proving in zero-knowledge that a number is the product of two safe primes / Jan Camenisch and Markus Michels -- Secure hash-and-sign signatures without the random oracle / Rosario Gennaro, Shai Halevi, and Tal Rabin -- A note on the limits of collusion-resistant watermarks / Funda Ergun, Joe Kilian, and Ravi Kumar -- Coin-based anonymous fingerprinting / Birgit Pfitzmann and Ahmad-Reza Sadeghi -- On the performance of hyperelliptic cryptosystems / Nigel P. Smart -- Fast elliptic curve algorithm combining Frobenius map and table reference to adapt to higher characteristic / Tetsutaro Kobayashi [and others] -- Comparing the MOV and FR reductions in elliptic curve cryptography / Ryuichi Harasawa [and others] -- Unbalanced oil and vinegar signature schemes / Aviad Kipnis, Jacques Patarin, and Louis Goubin -- Public-key cryptosystems based on composite degree residuosity classes / Pascal Paillier -- New public key cryptosystems based on the dependent-RSA problems / David Pointcheval -- Resistance against general iterated attacks / Serge Vaudenay -- XOR and non-XOR differential probabilities / Philip Hawkes and Luke O'Connor -- S-boxes with controllable nonlinearity / Jung Hee Cheon, Seongtaek Chee, and Choonsik Park -- Secure distributed key generation for discrete-log based cryptosystems / Rosario Gennaro [and others] -- Efficient multiparty computations secure against an adaptive adversary / Ronald Cramer [and others] -- Distributed pseudo-random functions and KDCs / Moni Naor, Benny Pinkas, and Omer Reingold -- Improved fast correlation attacks on stream ciphers via convolutional codes / Thomas Johansson and Fredrik Jönsson -- Cryptanalysis of an identification scheme based on the permuted perceptron problem / Lars R. Knudsen and Willi Meier -- An analysis of exponentiation based on formal languages / Luke O'Connor -- Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key / Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki -- Computationally private information retrieval with polylogarithmic communication / Christian Cachin, Silvio Micali, and Markus Stadler -- On the concurrent composition of zero-knowledge proofs / Ransom Richardson and Joe Kilian -- Pseudorandom function tribe ensembles based on one-way permutations / Marc Fischlin -- Secure communication in broadcast channels / Yongge Wang and Yvo Desmedt -- Efficient communication-storage tradeoffs for multicast encryption / Ran Canetti, Tal Malkin, and Kobbi Nissim.

This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT '99, held in Prague, Czech Republic in May 1999. The 32 revised full papers presented were carefully selected during highly competitive reviewing process. The book is divided in topical sections on cryptanalysis, hash functions, foundations, public key cryptosystems, watermarking and fingerprinting, elliptic curves, new schemes, block ciphers, distributed cryptography, tools from related areas, and broadcast and multicast.

Powered by Koha