Sold Out
Book Categories |
New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive | 1 | |
Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages | 17 | |
On Sufficient Randomness for Secure Public-Key Cryptosystems | 34 | |
Multi-recipient Public-Key Encryption with Shortened Ciphertext | 48 | |
Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code | 64 | |
Formal Proofs for the Security of Signcryption | 80 | |
A Provably Secure Restrictive Partially Blind Signature Scheme | 99 | |
M + 1-st Price Auction Using Homomorphic Encryption | 115 | |
Client/Server Tradeoffs for Online Elections | 125 | |
Self-tallying Elections and Perfect Ballot Secrecy | 141 | |
Efficient 1-Out-n Oblivious Transfer Schemes | 159 | |
Linear Code Implies Public-Key Traitor Tracing | 172 | |
Design and Security Analysis of Anonymous Group Identification Protocols | 188 | |
On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem | 199 | |
Solving Underdefined Systems of Multivariate Quadratic Equations | 211 | |
Selective Forgery of RSA Signatures with Fixed-Pattern Padding | 228 | |
New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 | 237 | |
SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation | 252 | |
A Combined Timing and Power Attack | 263 | |
A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks | 280 | |
New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report | 297 | |
An Improved Method of Multiplication on Certain Elliptic Curves | 310 | |
An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves | 323 | |
Weierstrass Elliptic Curves and Side-Channel Attacks | 335 | |
One-Way Cross-Trees and Their Applications | 346 | |
RSA Key Generation with Verifiable Randomness | 357 | |
New Minimal Modified Radix-r Representation with Applications to Smart Cards | 375 | |
Author Index | 385 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionPublic Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002
X
This Item is in Your InventoryPublic Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002
X
You must be logged in to review the productsX
X
X
Add Public Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, This book constitutes the thoroughly refereed proceedings of the PKC Public Key Cryptography, PKC 2002, held in Paris, France in February 2002. This book presents 26 carefully reviewed papers selected from 69 submissions plus one invited talk. Among the t, Public Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 to the inventory that you are selling on WonderClubX
X
Add Public Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002, This book constitutes the thoroughly refereed proceedings of the PKC Public Key Cryptography, PKC 2002, held in Paris, France in February 2002. This book presents 26 carefully reviewed papers selected from 69 submissions plus one invited talk. Among the t, Public Key Cryptography: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 to your collection on WonderClub |