


Остановите войну!
for scientists:


default search action
10. PKC 2007: Beijing, China
- Tatsuaki Okamoto, Xiaoyun Wang:
Public Key Cryptography - PKC 2007, 10th International Conference on Practice and Theory in Public-Key Cryptography, Beijing, China, April 16-20, 2007, Proceedings. Lecture Notes in Computer Science 4450, Springer 2007, ISBN 978-3-540-71676-1
Signatures I
- Xavier Boyen, Brent Waters:
Full-Domain Subgroup Hiding and Constant-Size Group Signatures. 1-15 - He Ge, Stephen R. Tate:
A Direct Anonymous Attestation Scheme for Embedded Devices. 16-30 - Marc Fischlin:
Anonymous Signatures Made Easy. 31-42 - Guilin Wang, Joonsang Baek, Duncan S. Wong, Feng Bao:
On the Generic and Efficient Constructions of Secure Designated Confirmer Signatures. 43-60
Invited Talk I
- Dima Ruinskiy, Adi Shamir, Boaz Tsaban:
Cryptanalysis of Group-Based Key Agreement Protocols Using Subgroup Distance Functions. 61-75
Cryptanalysis
- Alex D. Myasnikov, Alexander Ushakov:
Length Based Attack and Braid Groups: Cryptanalysis of Anshel-Anshel-Goldfeld Key Exchange Protocol. 76-88 - Nicolas Gama, Phong Q. Nguyen:
New Chosen-Ciphertext Attacks on NTRU. 89-106 - Daewan Han, Myung-Hwan Kim, Yongjin Yeom:
Cryptanalysis of the Paeng-Jung-Ha Cryptosystem from PKC 2003. 107-117
Protocols I
- Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum:
Optimistic Fair Exchange in a Multi-user Setting. 118-133 - Huafei Zhu, Willy Susilo
, Yi Mu:
Multi-party Stand-Alone and Setup-Free Verifiably Committed Signatures. 134-149 - Ahto Buldas, Sven Laur:
Knowledge-Binding Commitments with Applications in Time-Stamping. 150-165
Signatures II
- Hovav Shacham, Brent Waters:
Efficient Ring Signatures Without Random Oracles. 166-180 - Eiichiro Fujisaki, Koutarou Suzuki:
Traceable Ring Signature. 181-200 - Mihir Bellare, Sarah Shoup:
Two-Tier Signatures, Strongly Unforgeable Signatures, and Fiat-Shamir Without Random Oracles. 201-216 - Emmanuel Bresson, Dario Catalano, Rosario Gennaro:
Improved On-Line/Off-Line Threshold Signatures. 217-232
Multivariate Cryptosystems
- Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner:
High Order Linearization Equation (HOLE) Attack on Multivariate Public Key Cryptosystems. 233-248 - Vivien Dubois, Louis Granboulan, Jacques Stern:
Cryptanalysis of HFE with Internal Perturbation. 249-265 - Jintai Ding, Christopher Wolf, Bo-Yin Yang:
l-Invertible Cycles for Multivariate Quadratic (MQ) Public Key Cryptography. 266-281
Encryption
- Eike Kiltz
:
Chosen-Ciphertext Secure Key-Encapsulation Based on Gap Hashed Diffie-Hellman. 282-297 - Benoît Libert, Jean-Jacques Quisquater, Moti Yung:
Parallel Key-Insulated Public Key Encryption Without Random Oracles. 298-314 - Akinori Kawachi, Keisuke Tanaka, Keita Xagawa:
Multi-bit Cryptosystems Based on Lattice Problems. 315-329
Protocols II
- Juan A. Garay, Berry Schoenmakers, José Villegas:
Practical and Secure Solutions for Integer Comparison. 330-342 - Takashi Nishide, Kazuo Ohta:
Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. 343-360 - Michel Abdalla
, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan
, Nigel P. Smart:
Identity-Based Traitor Tracing. 361-376 - Jens Groth
, Steve Lu:
Verifiable Shuffle of Large Size Ciphertexts. 377-392
Invited Talk II
- Rafail Ostrovsky, William E. Skeith III:
A Survey of Single-Database Private Information Retrieval: Techniques and Applications. 393-411
Number Theoretic Techniques
- Noboru Kunihiro, Kaoru Kurosawa:
Deterministic Polynomial Time Equivalence Between Factoring and Key-Recovery Attack on Takagi's RSA. 412-425 - Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko:
Efficient Pseudorandom Generators Based on the DDH Assumption. 426-441 - Jung Hee Cheon, Jeong Hyun Yi:
Fast Batch Verification of Multiple Signatures. 442-457
Public-Key Infrastructure
- Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi:
A Closer Look at PKI: Security and Efficiency. 458-475 - Junzuo Lai, Weidong Kou:
Self-Generated-Certificate Public Key Encryption Without Pairing. 476-489

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.