zbMATH — the first resource for mathematics

Advances in cryptology - ASIACRYPT 2000. 6th international conference on the Theory and application of cryptology and information security, Kyoto, Japan, December 3–7, 2000. Proceedings. (English) Zbl 0952.00064
Lecture Notes in Computer Science. 1976. Berlin: Springer. xii, 630 p. (2000).

Show indexed articles as search result.

The articles of this volume will be reviewed individually. The 1999 conference has been reviewed (see Zbl 0929.00090).
Indexed articles:
Biryukov, Alex; Shamir, Adi, Cryptanalytic time/memory/data tradeoffs for stream ciphers, 1-13 [Zbl 0980.94013]
Durfee, Glenn; Nguyen, Phong Q., Cryptanalysis of the RSA schemes with short secret exponent from Asiacrypt ’99, 14-29 [Zbl 0980.94015]
Boneh, Dan; Joux, Antoine; Nguyen, Phong Q., Why textbook ElGamal and RSA encryption are insecure. (Extended abstract), 30-43 [Zbl 0980.94014]
Goubin, Louis; Courtois, Nicolas T., Cryptanalysis of the TTM cryptosystem, 44-57 [Zbl 0980.94017]
Boyd, Colin; Pavlovski, Chris, Attacking and repairing batch verification schemes, 58-71 [Zbl 0966.94008]
Berson, Thomas A., Cryptography everywhere. (IACR distinguished lecture). (Abstract), 72 [Zbl 0980.94012]
Schnorr, Claus Peter; Jakobsson, Markus, Security of signed ElGamal encryption, 73-89 [Zbl 0980.94021]
Coron, Jean-Sébastien; Koeune, Francois; Naccache, David, From fixed-length to arbitrary-length RSA padding schemes, 90-96 [Zbl 0966.94020]
Young, Adam; Yung, Moti, Towards signature-only signature schemes, 97-115 [Zbl 0980.94022]
Abdalla, Michel; Reyzin, Leonid, A new forward-secure digital signature scheme, 116-129 [Zbl 0966.94019]
Hanaoka, Goichiro; Shikata, Junji; Zheng, Yuliang; Imai, Hideki, Unconditionally secure digital signature schemes admitting transferability, 130-142 [Zbl 0980.94025]
Hirt, Martin; Maurer, Ueli; Przydatek, Bartosz, Efficient secure multi-party computation. (Extended Abstract), 143-161 [Zbl 0966.94010]
Jakobsson, Markus; Juels, Ari, Mix and match: Secure function evaluation via ciphertexts. (Extended abstract), 162-177 [Zbl 0974.94014]
Ohkubo, Miyako; Abe, Masayuki, A length-invariant hybrid mix, 178-191 [Zbl 0974.94021]
Mitomo, Masashi; Kurosawa, Kaoru, Attack for flash MIX, 192-204 [Zbl 0974.94019]
Naor, Moni; Pinkas, Benny, Distributed oblivious transfer, 205-219 [Zbl 0974.94020]
Lenstra, Arjen K.; Verheul, Eric R., Key improvements to XTR, 220-233 [Zbl 0974.94016]
Hamdy, Safuat; Möller, Bodo, Security of cryptosystems based on class groups of imaginary quadratic orders, 234-247 [Zbl 0974.94012]
Arita, Seigo, Weil descent of elliptic curves over finite fields of characteristic three, 248-258 [Zbl 1031.11034]
Chao, Jinhui; Matsuo, Kazuto; Kawashiro, Hiroto; Tsujii, Shigeo, Construction of hyperelliptic curves with CM and its application to cryptosystems, 259-273 [Zbl 0966.94009]
Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Hong, Seokhie; Park, Sangjoon, Provable security for the skipjack-like structure against differential cryptanalysis and linear cryptanalysis, 274-288 [Zbl 0965.94016]
Moriai, Shiho; Vaudenay, Serge, On the pseudorandomness of top-level schemes of block ciphers, 289-302 [Zbl 0966.94013]
Hawkes, Philip; Rose, Gregory G., Exploiting multiples of the connection polynomial in word-oriented stream ciphers, 303-316 [Zbl 0974.94013]
Bellare, Mihir; Rogaway, Phillip, Encode-then-encipher encryption: How to exploit nonces or redundancy in plaintexts for efficient cryptography, 317-330 [Zbl 0974.94008]
Camenisch, Jan; Damgård, Ivan, Verifiable encryption, group encryption, and their applications to separable group signatures and signature sharing schemes. (Extended abstract), 331-345 [Zbl 0974.94010]
Jakobsson, Markus; Juels, Ari, Addition of ElGamal plaintexts, 346-358 [Zbl 0974.94015]
King, Brian, Improved methods to perform threshold RSA, 359-372 [Zbl 0974.94024]
Franklin, Matt; Sander, Tomas, Commital deniable proofs and electronic campaign finance, 373-387 [Zbl 0973.68057]
Ogata, Wakaha; Kurosawa, Kaoru, Provably secure metering scheme, 388-398 [Zbl 0977.68032]
Imai, Hideki; Yamagishi, Atsuhiro, CRYPTREC project – Cryptographic Evaluation Project for the Japanese Electronic Government, 399-400 [Zbl 0980.94019]
Pfitzmann, Birgit; Sadeghi, Ahmad-Reza, Anonymous fingerprinting with direct non-repudiation, 401-414 [Zbl 0974.94025]
Camenisch, Jan, Efficient anonymous fingerprinting with group signatures. (Extended abstract), 415-428 [Zbl 0980.94024]
Gutfreund, Danny; Ben-Or, Michael, Increasing the power of the dealer in non-interactive zero-knowledge proof systems, 429-442 [Zbl 0980.94018]
Hada, Satoshi, Zero-knowledge and code obfuscation, 443-457 [Zbl 0980.94020]
Fischlin, Marc, A note on security proofs in the generic model, 458-469 [Zbl 0980.94016]
Zheng, Yuliang; Zhang, Xian-Mo, On relationships among avalanche, nonlinearity, and correlation immunity, 470-482 [Zbl 0966.94018]
Wagner, David, Cryptanalysis of the Yi-Lam hash, 483-488 [Zbl 0966.94017]
Akkar, Mehdi-Laurent; Bevan, Régis; Dischamp, Paul; Moyart, Didier, Power analysis, what is now possible. ., 489-502 [Zbl 0980.94011]
Desai, Anand; Miner, Sara, Concrete security characterizations of PRFs and PRPs: Reductions and applications, 503-516 [Zbl 0974.94011]
Bellare, Mihir; Boldyreva, Alexandra, The security of chaffing and winnowing, 517-530 [Zbl 0973.68058]
Bellare, Mihir; Namprempre, Chanathip, Authenticated encryption: Relations among notions and analysis of the generic composition paradigm, 531-545 [Zbl 0973.68059]
Abdalla, Michel; Bellare, Mihir, Increasing the lifetime of a key: A comparative analysis of the security of re-keying techniques, 546-559 [Zbl 0973.68060]
Wagner, David; Goldberg, Ian, Proofs of security for the Unix password hashing algorithm, 560-572 [Zbl 0973.68061]
Paillier, Pascal, Trapdooring discrete logarithms on elliptic curves over rings, 573-584 [Zbl 0974.94022]
Loidreau, Pierre, Strengthening McEliece cryptosystem, 585-598 [Zbl 0974.94017]
MacKenzie, Philip; Patel, Sarvar; Swaminathan, Ram, Password-authenticated key exchange based on RSA, 599-613 [Zbl 0974.94018]
Tzeng, Wen-Guey; Tzeng, Zhi-Jia, Round-efficient conference key agreement protocols with provable security, 614-627 [Zbl 0974.94023]

94-06 Proceedings, conferences, collections, etc. pertaining to information and communication theory
68-06 Proceedings, conferences, collections, etc. pertaining to computer science
94A60 Cryptography
68P25 Data encryption (aspects in computer science)
00B25 Proceedings of conferences of miscellaneous specific interest