Public Key Cryptography - PKC 2006 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings

The 9th International Conference on Theory and Practice of Public-Key Cr- tography(PKC 2006) took place in New York City. PKC is the premier inter- tional conference dedicated to cryptology focusing on all aspects of public-key cryptography. The event is sponsored by the International Association of...

Full description

Bibliographic Details
Other Authors: Yung, Moti (Editor), Dodis, Yevgeniy (Editor), Kiayias, Aggelos (Editor), Malkin, Tal (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg Springer Berlin Heidelberg 2006, 2006
Edition:1st ed. 2006
Series:Lecture Notes in Computer Science
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
Table of Contents:
  • Password-Based Group Key Exchange in a Constant Number of Rounds
  • Multi-party Computation
  • Conditional Oblivious Cast
  • Efficiency Tradeoffs for Malicious Two-Party Computation
  • PKI Techniques
  • On Constructing Certificateless Cryptosystems from Identity Based Encryption
  • Building Better Signcryption Schemes with Tag-KEMs
  • Security-Mediated Certificateless Cryptography
  • k-Times Anonymous Authentication with a Constant Proving Cost
  • Cryptanalysis and Protocol Weaknesses
  • New Attacks on RSA with Small Secret CRT-Exponents
  • An Attack on a Modified Niederreiter Encryption Scheme
  • Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm
  • Distributed Crypto-computing
  • Efficient Polynomial Operations in the Shared-Coefficients Setting
  • Generic On-Line/Off-Line Threshold Signatures
  • Linear Integer Secret Sharing and Distributed Exponentiation
  • Encryption Methods
  • Encoding-Free ElGamal Encryption Without Random Oracles
  • Parallel Key-Insulated Public Key Encryption
  • Provably Secure Steganography with Imperfect Sampling
  • Cryptographic Hash and Applications
  • Collision-Resistant No More: Hash-and-Sign Paradigm Revisited
  • Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption
  • Number Theory Algorithms
  • An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve
  • Efficient Scalar Multiplication by Isogeny Decompositions
  • Curve25519: New Diffie-Hellman Speed Records
  • Pairing-Based Cryptography
  • Strongly Unforgeable Signatures Based on Computational Diffie-Hellman
  • Generalization of the Selective-ID Security Model for HIBE Protocols
  • Identity-Based Aggregate Signatures
  • On the Limitations of the Spread of an IBE-to-PKE Transformation
  • Cryptosystems Design and Analysis
  • Inoculating Multivariate Schemes Against Differential Attacks
  • Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol
  • High-Order Attacks Against the Exponent Splitting Protection
  • Signature and Identification
  • New Online/Offline Signature Schemes Without Random Oracles
  • Anonymous Signature Schemes
  • The Power of Identification Schemes
  • Authentication and Key Establishment
  • Security Analysis of KEA Authenticated Key Exchange Protocol
  • SAS-Based Authenticated Key Agreement
  • The Twist-AUgmented Technique for Key Exchange