IACR Archive     By conference     Most prolific     All committees     Most committees     Report errors     What's new

Proceedings of PKC 2004

Public Key Cryptography - PKC 2004, 7th International Workshop on Theory and Practice in Public Key Cryptography, Singapore, March 1-4, 2004 , Springer
A Generalized Wiener Attack on RSA., Johannes Blömer, Alexander May, pp. 1-13
 PDF  postscript BibTeX
Cryptanalysis of a Public-Key Encryption Scheme Based on the Polynomial Reconstruction Problem., Jean-Sébastien Coron, pp. 14-27
 PDF  postscript BibTeX
Faster Scalar Multiplication on Koblitz Curves Combining Point Halving with the Frobenius Endomorphism., Roberto Maria Avanzi, Mathieu Ciet, Francesco Sica, pp. 28-40
 PDF  postscript BibTeX
Application of Montgomery's Trick to Scalar Multiplication for Elliptic and Hyperelliptic Curves Using a Fixed Base Point., Pradeep Kumar Mishra, Palash Sarkar, pp. 41-54
 PDF  postscript BibTeX
Fast Arithmetic on Jacobians of Picard Curves., Stéphane Flon, Roger Oyono, pp. 55-68
 PDF  postscript BibTeX
Undeniable Signatures Based on Characters: How to Sign with One Bit., Jean Monnerat, Serge Vaudenay, pp. 69-85
 PDF  postscript BibTeX
Efficient Extension of Standard Schnorr/RSA Signatures into Universal Designated-Verifier Signatures., Ron Steinfeld, Huaxiong Wang, Josef Pieprzyk, pp. 86-100
 PDF  postscript BibTeX
Constructing Committed Signatures from Strong-RSA Assumption in the Standard Complexity Model., Huafei Zhu, pp. 101-114
 PDF  postscript BibTeX
Constant Round Authenticated Group Key Agreement via Distributed Computation., Emmanuel Bresson, Dario Catalano, pp. 115-129
 PDF  postscript BibTeX
Efficient ID-based Group Key Agreement with Bilinear Maps., Kyu Young Choi, Jung Yeon Hwang, Dong Hoon Lee, pp. 130-144
 PDF  postscript BibTeX
New Security Results on Encrypted Key Exchange., Emmanuel Bresson, Olivier Chevassut, David Pointcheval, pp. 145-158
 PDF  postscript BibTeX
New Results on the Hardness of Diffie-Hellman Bits., Maria Isabel Gonzalez Vasco, Mats Näslund, Igor Shparlinski, pp. 159-172
 PDF  postscript BibTeX
Short Exponent Diffie-Hellman Problems., Takeshi Koshiba, Kaoru Kurosawa, pp. 173-186
 PDF  postscript BibTeX
Efficient Signcryption with Key Privacy from Gap Diffie-Hellman Groups., Benoît Libert, Jean-Jacques Quisquater, pp. 187-200
 PDF  postscript BibTeX
Algebraic Attacks over GF(2k), Application to HFE Challenge 2 and Sflash-v2., Nicolas Courtois, pp. 201-217
 PDF  postscript BibTeX
Secret Exponent Attacks on RSA-type Schemes with Moduli N= prq., Alexander May, pp. 218-230
 PDF  postscript BibTeX
General Group Authentication Codes and Their Relation to "Unconditionally-Secure Signatures"., Reihaneh Safavi-Naini, Luke McAven, Moti Yung, pp. 231-247
 PDF  postscript BibTeX
From Digital Signature to ID-based Identification/Signature., Kaoru Kurosawa, Swee-Huay Heng, pp. 248-261
 PDF  postscript BibTeX
Identity-Based Threshold Decryption., Joonsang Baek, Yuliang Zheng, pp. 262-276
 PDF  postscript BibTeX
An Efficient Signature Scheme from Bilinear Pairings and Its Applications., Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo, pp. 277-290
 PDF  postscript BibTeX
An RSA Family of Trap-Door Permutations with a Common Domain and Its Applications., Ryotaro Hayashi, Tatsuaki Okamoto, Keisuke Tanaka, pp. 291-304
 PDF  postscript BibTeX
A New Variant of the Matsumoto-Imai Cryptosystem through Perturbation., Jintai Ding, pp. 305-318
 PDF  postscript BibTeX
Efficient, Verifiable Shuffle Decryption and Its Requirement of Unlinkability., Jun Furukawa, pp. 319-332
 PDF  postscript BibTeX
A Point Compression Method for Elliptic Curves Defined over GF(2 n)., Brian King, pp. 333-345
 PDF  postscript BibTeX
On the Optimal Parameter Choice for Elliptic Curve Cryptosystems Using Isogeny., Toru Akishita, Tsuyoshi Takagi, pp. 346-359
 PDF  postscript BibTeX
On the Security of Multiple Encryption or CCA-security+CCA-security=CCA-security?, Rui Zhang 0002, Goichiro Hanaoka, Junji Shikata, Hideki Imai, pp. 360-374
 PDF  postscript BibTeX
QuasiModo: Efficient Certificate Validation and Revocation., Farid F. Elwailly, Craig Gentry, Zulfikar Ramzan, pp. 375-388
 PDF  postscript BibTeX
A Distributed Online Certificate Status Protocol with a Single Public Key., Satoshi Koga, Kouichi Sakurai, pp. 389-401
 PDF  postscript BibTeX
A First Approach to Provide Anonymity in Attribute Certificates., Vicente Benjumea, Javier Lopez, José A. Montenegro, José M. Troya, pp. 402-415
 PDF  postscript BibTeX
A Nonuniform Algorithm for the Hidden Number Problem in Subgroups., Igor Shparlinski, Arne Winterhof, pp. 416-424
 PDF  postscript BibTeX
Cryptographic Randomized Response Techniques., Andris Ambainis, Markus Jakobsson, Helger Lipmaa, pp. 425-438
 PDF  postscript BibTeX
A Correct, Private, and Efficient Mix Network., Kun Peng, Colin Boyd, Ed Dawson, Kapalee Viswanathan, pp. 439-454
 PDF  postscript BibTeX

[ IACR home page ] © IACR