Skip to main content
  • Conference proceedings
  • © 1998

Public Key Cryptography

First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1431)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 1998.

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (22 papers)

  1. Front Matter

  2. Distributed public key cryptosystems

    • Yair Frankel, Moti Yung
    Pages 1-13
  3. How (not) to design RSA signature schemes

    • Jean -FranÇois Misarsky
    Pages 14-28
  4. Overview of elliptic curve cryptography

    • Kiyomichi Araki, Takakazu Satoh, Shinji Miura
    Pages 29-49
  5. Lattices and cryptography: An overview

    • Jacques Stern
    Pages 50-54
  6. Lower bounds on term-based divisible cash systems

    • Tatsuaki Okamoto, Moti Yung
    Pages 72-82
  7. Certifying trust

    • Ilari Lehti, Pekka Nikander
    Pages 83-98
  8. On the security of server-aided RSA protocols

    • Johannes Merkle, Ralph Werchner
    Pages 99-116
  9. On the security of ElGamal based encryption

    • Yiannis Tsiounis, Moti Yung
    Pages 117-134
  10. On the security of Girault's identification scheme

    • Shahrokh Saeednia, Rei Safavi-Naini
    Pages 149-153
  11. A scheme for obtaining a message from the digital multisignature

    • Chin -Chen Chang, Jyh -Jong Leu, Pai -Cheng Huang, Wei -Bin Lee
    Pages 154-163
  12. Secure hyperelliptic cryptosystems and their performance

    • Yasuyuki Sakai, Kouichi Sakurai, Hirokazu Ishizuka
    Pages 164-181
  13. A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer

    • Toshio Hasegawa, Junko Nakajima, Mitsuru Matsui
    Pages 182-194
  14. Two efficient algorithms for arithmetic of elliptic curves using Frobenius map

    • Jung Hee Cheon, Sungmo Park, Sangwoo Park, Daeho Kim
    Pages 195-202
  15. Public-key cryptosystems using the modular group

    • Akihiro Yamamura
    Pages 203-216
  16. A cellular automaton based fast one-way hash function suitable for hardware implementation

    • Miodrag Mihaljević, Yuliang Zheng, Hideki Imai
    Pages 217-233
  17. A new hash function based on MDx-family and its application to MAC

    • Sang Uk Shin, Kyung Hyune Rhee, Dae Hyun Ryu, Sang Jin Lee
    Pages 234-246

Other Volumes

  1. Public Key Cryptography

About this book

This book constitutes the refereed proceedings of the First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, held in Pacifico Yokohama, Japan, in February 1998.
The volume presents four invited contributions together with 18 revised full papers selected from 30 submissions. The papers address all current issues in research and design in the area including digital signature schemes, digital payment systems, electronic commerce, cryptographic protocols, as well as foundational issues like integer factorization, elliptic curve aspects, hash functions, finite fields, etc.

Bibliographic Information

Buy it now

Buying options

Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access