Bounds and Constructions for Multireceiver Authentication Codes (Englisch)
- Neue Suche nach: Safavi-Naini, R.
- Neue Suche nach: Wang, H.
- Neue Suche nach: Safavi-Naini, R.
- Neue Suche nach: Wang, H.
- Neue Suche nach: Ohta, K.
- Neue Suche nach: Pei, D.
In:
Theory and application of cryptology and information security: Advances in cryptology
1514
;
242-256
;
1998
-
ISBN:
-
ISSN:
- Aufsatz (Konferenz) / Print
-
Titel:Bounds and Constructions for Multireceiver Authentication Codes
-
Beteiligte:
-
Kongress:International conference, Theory and application of cryptology and information security: Advances in cryptology ; 1998 ; Beijing
-
Erschienen in:Theory and application of cryptology and information security: Advances in cryptology , 1514 ; 242-256LECTURE NOTES IN COMPUTER SCIENCE , 1514 ; 242-256
-
Verlag:
- Neue Suche nach: Springer
-
Erscheinungsdatum:01.01.1998
-
Format / Umfang:15 pages
-
ISBN:
-
ISSN:
-
Medientyp:Aufsatz (Konferenz)
-
Format:Print
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Inhaltsverzeichnis Konferenzband
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Generating RSA Moduli with a Predetermined PortionLenstra, A. K. et al. | 1998
- 11
-
Generation of Shared RSA Keys by Two PartiesPoupard, G. / Stern, J. et al. | 1998
- 25
-
An Attack on RSA Given a Small Fraction of the Private Key BitsBoneh, D. / Durfee, G. / Frankel, Y. et al. | 1998
- 35
-
C~-~+^* and HM: Variations Around Two Schemes of T. Matsumoto and H. ImaiPatarin, J. / Goubin, L. / Courtois, N. et al. | 1998
- 50
-
ECC/DLP and Factoring-Based Cryptography: A Tale of Two FamiliesKaliski, B. S. et al. | 1998
- 51
-
Efficient Elliptic Curve Exponentiation Using Mixed CoordinatesCohen, H. / Miyaji, A. / Ono, T. et al. | 1998
- 66
-
Efficient Implementation of Schoof's AlgorithmIzu, T. / Kogure, J. / Noro, M. / Yokoyama, K. et al. | 1998
- 80
-
Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F~2^nSakai, Y. / Sakurai, K. et al. | 1998
- 95
-
Construction of Secure Elliptic Cryptosystems Using CM Tests and LiftingsChao, J. / Nakamura, O. / Sobataka, K. / Tsujii, S. et al. | 1998
- 110
-
Elliptic Curve Discrete Logarithms and the Index CalculusSilverman, J. H. / Suzuki, J. et al. | 1998
- 126
-
Cryptanalysis of Rijmen-Preneel Trapdoor CipherWu, H. / Bao, F. / Deng, R. H. / Ye, Q.-Z. et al. | 1998
- 133
-
Improved Truncated Differential Attacks on SAFERWu, H. / Bao, F. / Deng, R. H. / Ye, Q.-Z. et al. | 1998
- 148
-
Optimal Resistance Against the Davies and Murphy AttackPornin, T. et al. | 1998
- 160
-
A Group Signature Scheme with Improved EfficiencyCamenisch, J. / Michels, M. et al. | 1998
- 175
-
A Study on the Proposed Korean Digital Signature AlgorithmChae Hoon Lim / Pil Joong Lee et al. | 1998
- 187
-
Cryptanalysis of the Original McEliece CryptosystemCanteaut, A. / Sendrier, N. et al. | 1998
- 200
-
Improving the Security of the McEliece Public-Key CryptosystemSun, H.-M. et al. | 1998
- 214
-
Cryptanalysis in Prime Order Subgroups of Z^*~nMao, W. / Chae Hoon Lim et al. | 1998
- 227
-
Weak Invertibility of Finite Automata and Cryptanalysis on FAPKCDai, Z. / Ding Feng Ye / Kwok Yan Lam et al. | 1998
- 242
-
Bounds and Constructions for Multireceiver Authentication CodesSafavi-Naini, R. / Wang, H. et al. | 1998
- 257
-
Fair Off-Line e-Cash Made EasyFrankel, Y. / Tsiounis, Y. / Yung, M. et al. | 1998
- 271
-
Off-Line Fair Payment Protocols Using Convertible SignaturesBoyd, C. / Foo, E. et al. | 1998
- 286
-
Efficient Fair Exchange with Verifiable Confirmation of SignaturesChen, L. et al. | 1998
- 300
-
Adaptively Secure Oblivious TransferBeaver, D. et al. | 1998
- 315
-
ML-Sequences over Rings Z/(2^e)Qi, W. / Yang, J. / Zhou, J. et al. | 1998
- 327
-
Analysis Methods for (Alleged) RC4Knudsen, L. R. / Meier, W. / Preneel, B. / Rijmen, V. et al. | 1998
- 342
-
Reduced Complexity Correlation Attacks on Two Clock-Controlled GeneratorsJohansson, T. et al. | 1998
- 357
-
A New and Efficient All-Or-Nothing Disclosure of Secrets ProtocolStern, J. P. et al. | 1998
- 372
-
The Beguin-Quisquater Server-Aided RSA Protocol from Crypto'95 Is Not SecureNguyen, P. / Stern, J. et al. | 1998
- 380
-
Equitable Key Escrow with Limited Time Span (or How to Enforce Time Expiration Cryptographically)Burmester, M. / Desmedt, Y. / Seberry, J. et al. | 1998
- 392
-
Audio and Optical CryptographyDesmedt, Y. / Hou, S. / Quisquater, J.-J. et al. | 1998
- 405
-
Strong Security Against Active Attacks in Information-Theoretic Secret-Key AgreementWolf, S. et al. | 1998
- 420
-
Some Bounds and a Construction for Secure Broadcast EncryptionKurosawa, K. / Yoshida, T. / Desmedt, Y. / Burmester, M. et al. | 1998