Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1999, Proceedings - Lecture Notes in Computer Science - Y Zheng - Books - Springer-Verlag Berlin and Heidelberg Gm - 9783540656449 - February 17, 1999
In case cover and title do not match, the title is correct

Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1999, Proceedings - Lecture Notes in Computer Science

Y Zheng

Price
€ 69.49

Ordered from remote warehouse

Expected delivery Mar 10 - 19
Add to your iMusic wish list

Public Key Cryptography: Second International Workshop on Practice and Theory in Public Key Cryptography, Pkc'99, Kamakura, Japan, March 1-3, 1999, Proceedings - Lecture Notes in Computer Science

Marc Notes: Includes bibliographical references and index. Table of Contents: A New Type of Magic Ink Signatures Towards Transcript-Irrelevant Anonymity Revocation.- A New Aspect of Dual Basis for Efficient Field Arithmetic.- On the Security of Random Sources.- Anonymous Fingerprinting Based on Committed Oblivious Transfer.- How to Enhance the Security of Public-Key Encryption at Minimum Cost.- Encrypted Message Authentication by Firewalls.- A Relationship between One-Wayness and Correlation Intractability.- Message Recovery Fair Blind Signature.- On Quorum Controlled Asymmetric Proxy Re-encryption.- Mini-Cash: A Minimalistic Approach to E-Commerce.- Preserving Privacy in Distributed Delegation with Fast Certificates.- Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol.- Toward Fair International Key Escrow.- How to Copyright a Function?.- On the Security of RSA Screening.- The Effectiveness of Lattice Attacks Against Low-Exponent RSA.- A Trapdoor Permutation Equivalent to Factoring.- Low-Cost Double-Size Modular Exponentiation or How to Stretch Your Cryptoprocessor.- Evaluating Differential Fault Analysis of Unknown Cryptosystems.- Removing Interoperability Barriers Between the X.509 and EDIFACT Public Key Infrastructures: The DEDICA Project.- Hash Functions and the MAC Using All-or-Nothing Property.- Decision Oracles are Equivalent to Matching Oracles.- Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA s Secret.- Auto-Recoverable Cryptosystems with Faster Initialization and the Escrow Hierarchy.- A Secure Pay-per-View Scheme for Web-Based Video Service."Publisher Marketing: This book constitutes the refereed proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, held in Kamakura, Japan in March 1999. The 25 revised full papers presented were carefully reviewed and selected from a total of 61 submissions. The volume reports most recent research results on all relevant aspects in public key cryptography. Among the topics covered are digital signatures, anonymous finger printing, message authentication, digital payment, key escrow, RSA systems, hash functions, decision oracles, random numbers, finite field computations, pay-per-view-systems, and electronic commerce. Contributor Bio:  Imai, Hideki Hideki Imai is a full professor in the Institute of Industrial Science, University of Tokyo. Dr. Imai is the author/coauthor of 35 books and is a renowned speaker at conferences worldwide. He received his B. E., M. E. and Ph. D. in electrical engineering from the University of Tokyo.

Media Books     Paperback Book   (Book with soft cover and glued back)
Released February 17, 1999
ISBN13 9783540656449
Publishers Springer-Verlag Berlin and Heidelberg Gm
Pages 334
Dimensions 156 × 234 × 18 mm   ·   408 g
Language German  
Editor Imai, Hideki
Editor Zheng, Yuliang

Show all

More by Y Zheng