Advances in cryptologyASIACRYPT 2003 : 9th International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, November 30December 4, 2003 : proceedings
 Responsibility
 Chi Sung Laih (ed.).
 Imprint
 Berlin ; New York : SpringerVerlag, 2003.
 Physical description
 1 online resource (xiii, 542 pages) : illustrations
 Series
 Lecture notes in computer science ; 2894.
Online
More options
Description
Creators/Contributors
Contents/Summary
 Bibliography
 Includes bibliographical references and index.
 Contents

 Public Key Cryptography I
 ChosenCiphertext Security without Redundancy
 Some RSABased Encryption Schemes with Tight Security Reduction
 A Simple PublicKey Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications
 Number Theory I
 Factoring Estimates for a 1024Bit RSA Modulus
 Index Calculus Attack for Hyperelliptic Curves of Small Genus
 Efficient Implementations
 Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves
 Tate Pairing Implementation for Hyperelliptic Curves y 2 = x p
 x + d
 The AGMX 0(N) Heegner Point Lifting Algorithm and Elliptic Curve Point Counting
 Key Management and Protocols
 Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy
 LeakageResilient Authenticated Key Establishment Protocols
 Untraceable Fair Network Payment Protocols with OffLine TTP
 Hash Functions
 Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking
 New Parallel Domain Extenders for UOWHF
 Cryptanalysis of 3Pass HAVAL
 Group Signatures
 Efficient Group Signatures without Trapdoors
 Accumulating Composites and Improved Group Signing
 Almost Uniform Density of Power Residues and the Provable Security of ESIGN
 Number Theory II
 Rotations and Translations of Number Field Sieve Polynomials
 On Class Group Computations Using the Number Field Sieve
 Invited Talk
 The Secret and Beauty of Ancient Chinese Padlocks
 Block Ciphers
 A Traceable Block Cipher
 A New Attack against Khazad
 Broadcast and Multicast
 An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack
 Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes
 Foundations and Complexity Theory
 Boneh et al.'s kElement Aggregate Extraction Assumption Is Equivalent to the DiffieHellman Assumption
 On Diophantine Complexity and Statistical ZeroKnowledge Arguments
 Verifiable Homomorphic Oblivious Transfer and Private Equality Test
 Public Key Cryptography II
 Generalized Powering Functions and Their Application to Digital Signatures
 Certificateless Public Key Cryptography
 A Complete and Explicit Security Reduction Algorithm for RSABased Cryptosystems
 The Insecurity of Esign in Practical Implementations
 Digital Signature
 Efficient OneTime Proxy Signatures
 Universal DesignatedVerifier Signatures.
 Summary
 This book constitutes the refereed proceedings of the 9th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2003, held in Taipei, Taiwan in November/December 2003. The 32 revised full papers presented together with one invited paper were carefully reviewed and selected from 188 submissions. The papers are organized in topical sections on public key cryptography, number theory, efficient implementations, key management and protocols, hash functions, group signatures, block cyphers, broadcast and multicast, foundations and complexity theory, and digital signatures.
Subjects
Bibliographic information
 Publication date
 2003
 Series
 Lecture notes in computer science ; 2894
 ISBN
 9783540400615
 3540400613
 3540205926 (alk. paper)
 9783540205920 (alk. paper)