Public Key Cryptography [electronic resource] : Second International Workshop on Practice and Theory in Public Key Cryptography, PKC’99 Kamakura, Japan, March 1–3, 1999 Proceedings.

Contributor(s): SpringerLink (Online service)Material type: TextTextSeries: Lecture Notes in Computer Science ; 1560Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg, 1999Description: X, 334 p. online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540491620Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Computer software | Information Systems | Computer Science | Data Encryption | Algorithm Analysis and Problem Complexity | Computer Communication Networks | Management of Computing and Information Systems | Operating SystemsAdditional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
A New Type of “Magic Ink” Signatures — Towards Transcript-Irrelevant Anonymity Revocation -- A New Aspect of Dual Basis for Efficient Field Arithmetic -- On the Security of Random Sources -- Anonymous Fingerprinting Based on Committed Oblivious Transfer -- How to Enhance the Security of Public-Key Encryption at Minimum Cost -- Encrypted Message Authentication by Firewalls -- A Relationship between One-Wayness and Correlation Intractability -- Message Recovery Fair Blind Signature -- On Quorum Controlled Asymmetric Proxy Re-encryption -- Mini-Cash: A Minimalistic Approach to E-Commerce -- Preserving Privacy in Distributed Delegation with Fast Certificates -- Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol -- Toward Fair International Key Escrow -- How to Copyright a Function? -- On the Security of RSA Screening -- The Effectiveness of Lattice Attacks Against Low-Exponent RSA -- A Trapdoor Permutation Equivalent to Factoring -- Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor -- Evaluating Differential Fault Analysis of Unknown Cryptosystems -- Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project -- Hash Functions and the MAC Using All-or-Nothing Property -- Decision Oracles are Equivalent to Matching Oracles -- Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA’s Secret -- Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy -- A Secure Pay-per-View Scheme for Web-Based Video Service.
In: Springer eBooks
Item type: E-BOOKS
Tags from this library: No tags from this library for this title. Log in to add tags.
    Average rating: 0.0 (0 votes)
Current library Home library Call number Materials specified URL Status Date due Barcode
IMSc Library
IMSc Library
Link to resource Available EBK6679

A New Type of “Magic Ink” Signatures — Towards Transcript-Irrelevant Anonymity Revocation -- A New Aspect of Dual Basis for Efficient Field Arithmetic -- On the Security of Random Sources -- Anonymous Fingerprinting Based on Committed Oblivious Transfer -- How to Enhance the Security of Public-Key Encryption at Minimum Cost -- Encrypted Message Authentication by Firewalls -- A Relationship between One-Wayness and Correlation Intractability -- Message Recovery Fair Blind Signature -- On Quorum Controlled Asymmetric Proxy Re-encryption -- Mini-Cash: A Minimalistic Approach to E-Commerce -- Preserving Privacy in Distributed Delegation with Fast Certificates -- Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol -- Toward Fair International Key Escrow -- How to Copyright a Function? -- On the Security of RSA Screening -- The Effectiveness of Lattice Attacks Against Low-Exponent RSA -- A Trapdoor Permutation Equivalent to Factoring -- Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor -- Evaluating Differential Fault Analysis of Unknown Cryptosystems -- Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project -- Hash Functions and the MAC Using All-or-Nothing Property -- Decision Oracles are Equivalent to Matching Oracles -- Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA’s Secret -- Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy -- A Secure Pay-per-View Scheme for Web-Based Video Service.

There are no comments on this title.

to post a comment.
The Institute of Mathematical Sciences, Chennai, India

Powered by Koha