Cryptography and Computational Number Theory

This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na­ tional University of Singapo...

Full description

Bibliographic Details
Other Authors: Lam, Kwok Y. (Editor), Shparlinski, Igor (Editor), Wang, Huaxiong (Editor), Xing, Chaoping (Editor)
Format: eBook
Language:English
Published: Basel Birkhäuser 2001, 2001
Edition:1st ed. 2001
Series:Progress in Computer Science and Applied Logic
Subjects:
Online Access:
Collection: Springer Book Archives -2004 - Collection details see MPG.ReNa
LEADER 04277nmm a2200349 u 4500
001 EB000636839
003 EBX01000000000000000489921
005 00000000000000.0
007 cr|||||||||||||||||||||
008 140122 ||| eng
020 |a 9783034882958 
100 1 |a Lam, Kwok Y.  |e [editor] 
245 0 0 |a Cryptography and Computational Number Theory  |h Elektronische Ressource  |c edited by Kwok Y. Lam, Igor Shparlinski, Huaxiong Wang, Chaoping Xing 
250 |a 1st ed. 2001 
260 |a Basel  |b Birkhäuser  |c 2001, 2001 
300 |a VIII, 378 p  |b online resource 
505 0 |a Computational Number Theory -- On the Dimension and the Number of Parameters of a Unirational Variety -- On Elements of High Order in Finite Fields -- Counting the Number of Points on Affine Diagonal Curves -- Small Values of the Carmichael Function and Cryptographic Applications -- Density Estimates Related to Gauss Periods -- Distribution of the Coefficients of Primitive Polynomials over Finite Fields -- The Distribution of the Quadratic Symbol in Function Fields and a Faster Mathematical Stream Cipher -- Rational Groups of Elliptic Curves Suitable for Cryptography -- Effective Determination of the Proportion of Split Primes in Number Fields -- Algorithms for Generating, Testing and Proving Primes: A Survey -- Elliptic Curve Factorization Using a “Partially Oblivious” Function -- The Hermite-Serret Algorithm and 122 + 332 -- Applications of Algebraic Curves to Constructions of Sequences -- Cryptography -- Designated 2-Verifier Proofs and their Application to Electronic Commerce -- Divide and Conquer Attacks on Certain Irregularly Clocked Stream Ciphers -- New Results on the Randomness of Visual Cryptography Schemes -- Authentication — Myths and Misconceptions -- A Survey of Bit-security and Hard Core Functions -- On the Security of Diffie—Hellman Bits -- Polynomial Rings and Efficient Public Key Authentication II -- Security of Biased Sources for Cryptographic Keys -- Achieving Optimal Fairness from Biased Coinflips -- The Dark Side of the Hidden Number Problem: Lattice Attacks on DSA -- Distribution of Modular Sums and the Security of the Server Aided Exponentiation -- A General Construction for Fail-Stop Signatures using Authentication Codes -- Robust Additive Secret Sharing Schemes over Zm -- RSA Public Key Validation 
653 |a Number theory 
653 |a Number Theory 
653 |a Cryptography 
653 |a Data encryption (Computer science) 
653 |a Cryptology 
700 1 |a Shparlinski, Igor  |e [editor] 
700 1 |a Wang, Huaxiong  |e [editor] 
700 1 |a Xing, Chaoping  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b SBA  |a Springer Book Archives -2004 
490 0 |a Progress in Computer Science and Applied Logic 
028 5 0 |a 10.1007/978-3-0348-8295-8 
856 4 0 |u https://doi.org/10.1007/978-3-0348-8295-8?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 005.824 
520 |a This volume contains the refereed proceedings of the Workshop on Cryptography and Computational Number Theory, CCNT'99, which has been held in Singapore during the week of November 22-26, 1999. The workshop was organized by the Centre for Systems Security of the Na­ tional University of Singapore. We gratefully acknowledge the financial support from the Singapore National Science and Technology Board under the grant num­ ber RP960668/M. The idea for this workshop grew out of the recognition of the recent, rapid development in various areas of cryptography and computational number the­ ory. The event followed the concept of the research programs at such well-known research institutions as the Newton Institute (UK), Oberwolfach and Dagstuhl (Germany), and Luminy (France). Accordingly, there were only invited lectures at the workshop with plenty of time for informal discussions. It was hoped and successfully achieved that the meeting would encourage and stimulate further research in information and computer security as well as in the design and implementation of number theoretic cryptosystems and other related areas. Another goal of the meeting was to stimulate collaboration and more active interaction between mathematicians, computer scientists, practical cryptographers and engineers in academia, industry and government