Lecture Notes in Computer Science

Advances in Cryptology — ASIACRYPT’98

International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18–22, 1998, Proceedings

Editors: Ohta, Kazuo, Pei, Dingyi (Eds.)

Buy this book

eBook $69.99
price for USA (gross)
  • ISBN 978-3-540-49649-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA
  • ISBN 978-3-540-65109-3
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
About this book

ASIACRYPT’98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT’98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors’ affiliations of the 118 submissions and the 32 accepted papers range over 18 and 13 countries or regions, respectively. The submitted version of each paper was sent to all members of the Program Committee and was extensively examined by at least three committee members and/or outside experts. The review process was rigorously blinded and the anonymity of each submission are maintained until the selection was completed. We followed the traditional policy that each member of the Program Committee could be an author of at most one accepted paper. These proceedings contain the revised versions of the 32 contributed talks as well as a short note written by one invited speaker. Comments from the Program Committee were taken into account in the revisions. However, the authors (not the committee) bear full responsibility for the contents of their papers.

Table of contents (7 chapters)

  • An Attack on RSA Given a Small Fraction of the Private Key Bits

    Dan Boneh, Glenn Durfee, Yair Frankel

    Pages 25-34

  • Efficient Elliptic Curve Exponentiation Using Mixed Coordinates

    Henri Cohen, Atsuko Miyaji, Takatoshi Ono

    Pages 51-65

  • Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings

    Jinhui Chao, Osamu Nakamura, Kohji Sobataka, et al.

    Pages 95-109

  • Cryptanalysis of the Original McEliece Cryptosystem

    Anne Canteaut, Nicolas Sendrier

    Pages 187-199

  • Improving the Security of the McEliece Public-Key Cryptosystem

    Hung -Min Sun

    Pages 200-213

Buy this book

eBook $69.99
price for USA (gross)
  • ISBN 978-3-540-49649-6
  • Digitally watermarked, DRM-free
  • Included format: PDF
  • ebooks can be used on all reading devices
  • Immediate eBook download after purchase
Softcover $99.00
price for USA
  • ISBN 978-3-540-65109-3
  • Free shipping for individuals worldwide
  • Usually dispatched within 3 to 5 business days.
Loading...

Recommended for you

Loading...

Bibliographic Information

Bibliographic Information
Book Title
Advances in Cryptology — ASIACRYPT’98
Book Subtitle
International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18–22, 1998, Proceedings
Editors
  • Kazuo Ohta
  • Dingyi Pei
Series Title
Lecture Notes in Computer Science
Series Volume
1514
Copyright
1998
Publisher
Springer-Verlag Berlin Heidelberg
Copyright Holder
Springer-Verlag Berlin Heidelberg
eBook ISBN
978-3-540-49649-6
DOI
10.1007/3-540-49649-1
Softcover ISBN
978-3-540-65109-3
Series ISSN
0302-9743
Edition Number
1
Number of Pages
XII, 436
Number of Illustrations and Tables
2 b/w illustrations
Topics