Skip to main content
  • Conference proceedings
  • © 2000

Advances in Cryptology – EUROCRYPT 2000

International Conference on the Theory and Application of Cryptographic Techniques Bruges, Belgium, May 14-18, 2000 Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1807)

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (41 papers)

  1. Front Matter

    Pages I-XIII
  2. Factoring and Discrete Logarithm

    1. Factorization of a 512-Bit RSA Modulus

      • Stefania Cavallar, Bruce Dodson, Arjen K. Lenstra, Walter Lioen, Peter L. Montgomery, Brian Murphy et al.
      Pages 1-18
    2. Analysis and Optimization of the TWINKLE Factoring Device

      • Arjen K. Lenstra, Adi Shamir
      Pages 35-52
  3. Cryptanalysis I: Digital Signatures

    1. Noisy Polynomial Interpolation and Noisy Chinese Remaindering

      • Daniel Bleichenbacher, Phong Q. Nguyen
      Pages 53-69
    2. Cryptanalysis of Countermeasures Proposed for Repairing ISO 9796-1

      • Marc Girault, Jean-François Misarsky
      Pages 81-90
    3. Security Analysis of the Gennaro-Halevi-Rabin Signature Scheme

      • Jean-Sébastien Coron, David Naccache
      Pages 91-101
  4. Invited Talk

    1. On the Security of 3GPP Networks

      • Michael Walker
      Pages 102-103
  5. Private Information Retrieval

    1. Single Database Private Information Retrieval Implies Oblivious Transfer

      • Giovanni Di Crescenzo, Tal Malkin, Rafail Ostrovsky
      Pages 122-138
  6. Key Management Protocols

    1. Authenticated Key Exchange Secure against Dictionary Attacks

      • Mihir Bellare, David Pointcheval, Phillip Rogaway
      Pages 139-155
    2. Provably Secure Password-Authenticated Key Exchange Using Diffie-Hellman

      • Victor Boyko, Philip MacKenzie, Sarvar Patel
      Pages 156-171
    3. Fair Encryption of RSA Keys

      • Guillaume Poupard, Jacques Stern
      Pages 172-189
  7. Threshold Cryptography and Digital Signatures

    1. Computing Inverses over a Shared Secret Modulus

      • Dario Catalano, Rosario Gennaro, Shai Halevi
      Pages 190-206
    2. Practical Threshold Signatures

      • Victor Shoup
      Pages 207-220
    3. Confirmer Signature Schemes Secure against Adaptive Adversaries

      • Jan Camenisch, Markus Michels
      Pages 243-258
  8. Public-Key Encryption

    1. Public-Key Encryption in a Multi-user Setting: Security Proofs and Improvements

      • Mihir Bellare, Alexandra Boldyreva, Silvio Micali
      Pages 259-274

Editors and Affiliations

  • Department of Electrical Engineering - ESAT / COSIC, Katholieke Universiteit Leuven, Heverlee, Belgium

    Bart Preneel

Bibliographic Information

Buy it now

Buying options

eBook USD 84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access