Skip to main content
  • Conference proceedings
  • © 1999

Public Key Cryptography

Second International Workshop on Practice and Theory in Public Key Cryptography, PKC'99, Kamakura, Japan, March 1-3, 1999, Proceedings

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1560)

Conference series link(s): PKC: IACR International Conference on Public-Key Cryptography

Conference proceedings info: PKC 1999.

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (25 papers)

  1. Front Matter

    Pages I-IX
  2. A New Aspect of Dual Basis for Efficient Field Arithmetic

    • Chang -Hyi Lee, Jong -In Lim
    Pages 12-28
  3. On the Security of Random Sources

    • Jean -Sebastien Coron
    Pages 29-42
  4. How to Enhance the Security of Public-Key Encryption at Minimum Cost

    • Eiichiro Fujisaki, Tatsuaki Okamoto
    Pages 53-68
  5. Encrypted Message Authentication by Firewalls

    • Chandana Gamage, Jussipekka Leiwo, Yuliang Zheng
    Pages 69-81
  6. A Relationship between One-Wayness and Correlation Intractability

    • Satoshi Hada, Toshiaki Tanaka
    Pages 82-96
  7. Message Recovery Fair Blind Signature

    • Hyung -Woo Lee, Tai -Yun Kim
    Pages 97-111
  8. Mini-Cash: A Minimalistic Approach to E-Commerce

    • Markus Jakobsson
    Pages 122-135
  9. Preserving Privacy in Distributed Delegation with Fast Certificates

    • Pekka Nikander, Yki Kortesniemi, Jonna Partanen
    Pages 136-153
  10. Unknown Key-Share Attacks on the Station-to-Station (STS) Protocol

    • Simon Blake-Wilson, Alfred Menezes
    Pages 154-170
  11. Toward Fair International Key Escrow

    • Shingo Miyazaki, Ikuko Kuroda, Kouichi Sakurai
    Pages 171-187
  12. How to Copyright a Function?

    • David Naccache, Adi Shamir, Julien P. Stern
    Pages 188-196
  13. On the Security of RSA Screening

    • Jean -Sebastien Coron, David Naccache
    Pages 197-203
  14. The Effectiveness of Lattice Attacks Against Low-Exponent RSA

    • Christophe Coupé, Phong Nguyenhttp, Jacques Stern
    Pages 204-218
  15. A Trapdoor Permutation Equivalent to Factoring

    • Pascal Paillier
    Pages 219-222

Other Volumes

  1. Public Key Cryptography

Editors and Affiliations

  • University of North Carolina, Charlotte Dept. Software & Information Systems, Charlotte, USA

    Yuliang Zheng

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access