Security and Cryptology

Advances in Cryptology – ASIACRYPT 2005

11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings

Editors: Roy, Bimal Kumar (Ed.)

Buy this book

eBook $129.00
price for USA (gross)
  • ISBN 978-3-540-32267-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $169.00
price for USA
  • ISBN 978-3-540-30684-9
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.

Table of contents (37 chapters)

  • Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log

    Paillier, Pascal (et al.)

    Pages 1-20

  • Do All Elliptic Curves of the Same Order Have the Same Difficulty of Discrete Log?

    Jao, David (et al.)

    Pages 21-40

  • Adapting Density Attacks to Low-Weight Knapsacks

    Nguyễn, Phong Q. (et al.)

    Pages 41-58

  • Efficient and Secure Elliptic Curve Point Multiplication Using Double-Base Chains

    Dimitrov, Vassil (et al.)

    Pages 59-78

  • Upper Bounds on the Communication Complexity of Optimally Resilient Cryptographic Multiparty Computation

    Hirt, Martin (et al.)

    Pages 79-99

Buy this book

eBook $129.00
price for USA (gross)
  • ISBN 978-3-540-32267-2
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $169.00
price for USA
  • ISBN 978-3-540-30684-9
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Advances in Cryptology – ASIACRYPT 2005
Book Subtitle
11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings
Editors
  • Bimal Kumar Roy
Series Title
Security and Cryptology
Series Volume
3788
Copyright
2005
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-32267-2
DOI
10.1007/11593447
Softcover ISBN
978-3-540-30684-9
Edition Number
1
Number of Pages
XIV, 706
Topics