Search
International Association for Cryptologic Research
What's new
Archive
Best Papers
Videos
Authors
Coauthors
By year
By conference
All Committees
Most Committees
Report errors
Maps
About
Publications of pkc 2005
Preface and frontmatter
Page
Title
1-8
A New Related Message Attack on RSA
9-15
Breaking a Cryptographic Protocol with Pseudoprimes
16-28
Experimenting with Faults, Lattices and the DSA
29-46
Securing RSA-KEM via the AES
47-64
One-Time Verifier-Based Encrypted Key Exchange
65-84
Password-Based Authenticated Key Exchange in the Three-Party Setting
85-103
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods
104-119
Symmetric Subgroup Membership Problems
120-137
Optimizing Robustness While Generating Shared Secret Safe Primes
138-153
Fast Multi-computations with Integer Similarity Strategy
154-171
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order
172-183
Efficient
k
-Out-of-
n
Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries
184-198
Converse Results to the Wiener Attack on RSA
199-215
RSA with Balanced Short Exponents and Its Application to Entity Authentication
216-233
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity
234-243
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited
244-257
Tractable Rational Map Signature
258-274
Cryptanalysis of the Tractable Rational Map Cryptosystem
275-287
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems
288-301
Cryptanalysis of HFEv and Internal Perturbation of HFE
302-312
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible
313-327
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring
328-345
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme
346-361
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions
362-379
Improved Identity-Based Signcryption
380-397
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption
398-415
CBE from CL-PKE: A Generic Construction and Efficient Schemes
416-431
A Verifiable Random Function with Short Proofs and Keys