default search action
8. PKC 2005: Les Diablerets, Switzerland
- Serge Vaudenay:
Public Key Cryptography - PKC 2005, 8th International Workshop on Theory and Practice in Public Key Cryptography, Les Diablerets, Switzerland, January 23-26, 2005, Proceedings. Lecture Notes in Computer Science 3386, Springer 2005, ISBN 3-540-24454-9
Cryptanalysis
- Oded Yacobi, Yacov Yacobi:
A New Related Message Attack on RSA. 1-8 - Daniel Bleichenbacher:
Breaking a Cryptographic Protocol with Pseudoprimes. 9-15 - David Naccache, Phong Q. Nguyen, Michael Tunstall, Claire Whelan:
Experimenting with Faults, Lattices and the DSA. 16-28
Key Establishment
- Jakob Jonsson, Matthew J. B. Robshaw:
Securing RSA-KEM via the AES. 29-46 - Michel Abdalla, Olivier Chevassut, David Pointcheval:
One-Time Verifier-Based Encrypted Key Exchange. 47-64 - Michel Abdalla, Pierre-Alain Fouque, David Pointcheval:
Password-Based Authenticated Key Exchange in the Three-Party Setting. 65-84
Optimization
- Werner Schindler:
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods. 85-103 - Kristian Gjøsteen:
Symmetric Subgroup Membership Problems. 104-119
Building Blocks
- Emil Ong, John Kubiatowicz:
Optimizing Robustness While Generating Shared Secret Safe Primes. 120-137 - Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih:
Fast Multi-computations with Integer Similarity Strategy. 138-153 - Endre Bangerter, Jan Camenisch, Ueli M. Maurer:
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order. 154-171 - Cheng-Kang Chu, Wen-Guey Tzeng:
Efficient k-Out-of-n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries. 172-183
RSA Cryptography
- Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk:
Converse Results to the Wiener Attack on RSA. 184-198 - Hung-Min Sun, Cheng-Ta Yang:
RSA with Balanced Short Exponents and Its Application to Entity Authentication. 199-215 - Ryotaro Hayashi, Keisuke Tanaka:
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity. 216-233 - Julien Cathalo, Jean-Sébastien Coron, David Naccache:
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited. 234-243
Multivariate Asymmetric Cryptography
- Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-yen Chou, Bo-Yin Yang:
Tractable Rational Map Signature. 244-257 - Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel:
Cryptanalysis of the Tractable Rational Map Cryptosystem. 258-274 - Christopher Wolf, Bart Preneel:
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems. 275-287 - Jintai Ding, Dieter Schmidt:
Cryptanalysis of HFEv and Internal Perturbation of HFE. 288-301
Signature Schemes
- Louis Granboulan:
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible. 302-312 - Dario Catalano, Rosario Gennaro:
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring. 313-327 - Wakaha Ogata, Kaoru Kurosawa, Swee-Huay Heng:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme. 328-345 - Ivan Damgård, Kasper Dupont:
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions. 346-361
Identity-Based Cryptography
- Liqun Chen, John Malone-Lee:
Improved Identity-Based Signcryption. 362-379 - Joonsang Baek, Reihaneh Safavi-Naini, Willy Susilo:
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption. 380-397 - Sattam S. Al-Riyami, Kenneth G. Paterson:
CBE from CL-PKE: A Generic Construction and Efficient Schemes. 398-415
Best Paper Award
- Yevgeniy Dodis, Aleksandr Yampolskiy:
A Verifiable Random Function with Short Proofs and Keys. 416-431
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.