Skip to main content
  • Conference proceedings
  • © 2005

Public Key Cryptography - PKC 2005

8th International Workshop on Theory and Practice in Public Key Cryptography

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 3386)

Part of the book sub series: Security and Cryptology (LNSC)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 2005.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (28 papers)

  1. Front Matter

  2. Cryptanalysis

    1. A New Related Message Attack on RSA

      • Oded Yacobi, Yacov Yacobi
      Pages 1-8
    2. Breaking a Cryptographic Protocol with Pseudoprimes

      • Daniel Bleichenbacher
      Pages 9-15
    3. Experimenting with Faults, Lattices and the DSA

      • David Naccache, Phong Q. Nguyên, Michael Tunstall, Claire Whelan
      Pages 16-28
  3. Key Establishment

    1. Securing RSA-KEM via the AES

      • Jakob Jonsson, Matthew J. B. Robshaw
      Pages 29-46
    2. One-Time Verifier-Based Encrypted Key Exchange

      • Michel Abdalla, Olivier Chevassut, David Pointcheval
      Pages 47-64
    3. Password-Based Authenticated Key Exchange in the Three-Party Setting

      • Michel Abdalla, Pierre-Alain Fouque, David Pointcheval
      Pages 65-84
  4. Optimization

    1. Symmetric Subgroup Membership Problems

      • Kristian Gjøsteen
      Pages 104-119
  5. Building Blocks

    1. Optimizing Robustness While Generating Shared Secret Safe Primes

      • Emil Ong, John Kubiatowicz
      Pages 120-137
    2. Fast Multi-computations with Integer Similarity Strategy

      • Wu-Chuan Yang, Dah-Jyh Guan, Chi-Sung Laih
      Pages 138-153
  6. RSA Cryptography

    1. Converse Results to the Wiener Attack on RSA

      • Ron Steinfeld, Scott Contini, Huaxiong Wang, Josef Pieprzyk
      Pages 184-198
    2. From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited

      • Julien Cathalo, Jean-Sébastien Coron, David Naccache
      Pages 234-243
  7. Multivariate Asymmetric Cryptography

    1. Tractable Rational Map Signature

      • Lih-Chung Wang, Yuh-Hua Hu, Feipei Lai, Chun-Yen Chou, Bo-Yin Yang
      Pages 244-257
    2. Cryptanalysis of the Tractable Rational Map Cryptosystem

      • Antoine Joux, Sébastien Kunz-Jacques, Frédéric Muller, Pierre-Michel Ricordel
      Pages 258-274

Other Volumes

  1. Public Key Cryptography - PKC 2005

Editors and Affiliations

  • EPFL, Lausanne, Switzerland

    Serge Vaudenay

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access