Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008941128/catalog> ?p ?o. }
Showing items 1 to 40 of
40
with 100 items per page.
- catalog abstract "TheInternationalWorkshoponPracticeandTheoryinPublicKeyCryptog- phyPKC2002washeldattheMaisondelaChimie,situatedintheverycenter ofParis,FrancefromFebruary12to14,2002. ThePKCseriesofconferences yearlyrepresentsinternationalresearchandthelatestachievementsinthearea ofpublickeycryptography,coveringawidespectrumoftopics,fromcryptos- temstoprotocols,implementationtechniquesorcryptanalysis. Afterbeingheld infoursuccessiveyearsinpaci?c-asiancountries,PKC2002experiencedforthe ?rsttimeaEuropeanlocation,thusshowingitsabilitytoreachaneverwider audiencefromboththeindustrialcommunityandacademia. Weareverygratefultothe19membersoftheProgramCommitteefortheir hardande?cientworkinproducingsuchahighqualityprogram. Inresponseto thecallforpapersofPKC2002,69paperswereelectronicallyreceivedfrom13 di?erentcountriesthroughoutEurope,America,andtheFarEast. Allsubm- sionswerereviewedbyatleastthreemembersoftheprogramcommittee,who eventuallyselectedthe26papersthatappearintheseproceedings. Inaddition to this program, we were honored to welcome Prof. Bart Preneel who kindly acceptedtogivethisyear’sinvitedtalk. Theprogramcommitteegratefully- knowledgesthehelpofalargenumberofcolleagueswhoreviewedsubmissionsin theirareaofexpertise:MasayukiAbe,SeigoArita,OlivierBaudron,MihirB- lare,EmmanuelBresson,EricBrier,MathieuCiet,AlessandroCon?itti,Jean- S´ebastienCoron,RogerFischlin,Pierre-AlainFouque,MattFranklin,Rosario Genarro,MarcGirault,LouisGranboulan,GoichiroHanaoka,DarrelHank- son, Eliane Jaulmes, Ari Juels, Jinho Kim, Marcos Kiwi, Kazukuni Kobara, Francois Koeune, Byoungcheon Lee, A. K. Lenstra, Pierre Loidreau, Wenbo Mao, Gwenaelle Martinet, Yi Mu, Phong Nguyen, Satoshi Obana, Guillaume Poupard,YasuyukiSakai,HideoShimizu,TomShrimpton,RonSteinfeld,K- suyukiTakashima,HuaxiongWang,andYujiWatanabe. JulienBrouchier- servesspecialthanksforskillfullymaintainingtheprogramcommittee’swebsite andpatientlyhelpingoutduringtherefereeingprocess. Finally,wewishtothankalltheauthorswhocommittedtheirtimebys- mitting papers (including those whose submissions were not successful), thus makingthisconferencepossible,aswellastheparticipants,organizers,andc- tributorsfromaroundtheworldfortheirkindsupport. December2001 DavidNaccache,PascalPaillier PKC2002 FifthInternationalWorkshop onPracticeandTheory inPublicKeyCryptography MaisondelaChimie,Paris,France February12–14,2002 ProgramCommittee DavidNaccache(ProgramChair). . . . . . . . . . . . . . . . . . . . . . . . . . . . Gemplus,France DanielBleichenbacher. . . . . . . . . . . . . . . . . . . BellLabs,LucentTechnologies,USA YvoDesmedt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FloridaStateUniversity,USA MarcFischlin. . . . . . . . . . . . . . . . . . . . . . . Goethe-UniversityofFrankfurt,Germany ShaiHalevi. . . . . . . . . . . . . . . . . . . . . . . . . IBMT. J. WatsonResearchCenter,USA MarkusJakobsson . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RSALaboratories,USA AntoineJoux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DCSSI,France BurtKaliski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RSALaboratories,USA KwangjoKim . . . . . . . . . . . . InformationandCommunicationsUniversity,Korea EyalKushilevitz. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Technion,Israel PascalPaillier. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Gemplus,France ´ DavidPointcheval . . . . . . . . . . . . . . . . . . . . . . . . . . EcoleNormaleSup´erieure,France Jean-JacquesQuisquater. . . . . . . . . . Universit´eCatholiquedeLouvain,Belgium PhillipRogaway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UCDavis,USA KazueSako. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . NECCorporation,Japan BruceSchneier. . . . . . . . . . . . . . . . . . . . . . . . . . . CounterpaneInternetSecurity,USA JunjiShikata. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UniversityofTokyo,Japan IgorShparlinski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MacquarieUniversity,Australia MotiYung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Certco,USA JianyingZhou. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OracleCorporation,USA TableofContents EncryptionSchemes NewSemanticallySecurePublic-KeyCryptosystemsfromtheRSA-Primitive 1 KouichiSakurai(KyushuUniversity,Japan),TsuyoshiTakagi (TechnischeUniversit¨ atDarmstadt,Germany) OptimalChosen-CiphertextSecureEncryption ofArbitrary-LengthMessages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 Jean-S´ ebastien Coron (Gemplus, France), Helena Handschuh (Gemplus,France),MarcJoye(Gemplus,France),PascalPaillier ´ (Gemplus,France),DavidPointcheval(EcoleNormaleSup´ erieure,France), ChristopheTymen(Gemplus,France) OnSu?cientRandomnessforSecurePublic-KeyCryptosystems. . . . . . . . . 34 Takeshi Koshiba (Fujitsu Laboratories Ltd, Japan) Multi-recipientPublic-KeyEncryptionwithShortenedCiphertext. . . . . . . . 48 Kaoru Kurosawa (Ibaraki University, Japan) SignatureSchemes E?cientandUnconditionallySecureDigitalSignatures andaSecurityAnalysisofaMultireceiverAuthenticationCode. . . . . . . . . . 64 GoichiroHanaoka(UniversityofTokyo,Japan),JunjiShikata (University of Tokyo, Japan), Yuliang Zheng (UNC Charlotte, USA), HidekiImai(UniversityofTokyo,Japan) FormalProofsfortheSecurityofSigncryption. . . . . . . . . . . . . . . . . . . . . . . . . 80 JoonsangBaek(MonashUniversity,Australia),RonSteinfeld(Monash University,Australia),YuliangZheng(UNCCharlotte,USA) AProvablySecureRestrictivePartiallyBlindSignatureScheme. . . . . . . . . 99 GregMaitland(QueenslandUniversityofTechnology,Australia), ColinBoyd(QueenslandUniversityofTechnology,Australia) ProtocolsI M+1-stPriceAuctionUsingHomomorphicEncryption. . . . . . . . . . . . . . . . 115 Masayuki Abe (NTT ISP Labs, Japan), Koutarou Suzuki (NTT ISP Labs,Japan) Client/ServerTradeo?sforOnlineElections. . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Ivan Damg? ard (Aarhus University, Denmark), Mads Jurik (Aarhus University,Denmark) X TableofContents Self-tallyingElectionsandPerfectBallotSecrecy. . . . . . . . . . . . . . . . . . . . . . 141 AggelosKiayias(GraduateCenter,CUNY,USA),MotiYung(CertCo, USA) ProtocolsII E?cient1-Out-nObliviousTransferSchemes. . . . . . . . . . . . . . . . . . . . . . . . . . 159 Wen-GueyTzeng(NationalChiaoTungUniversity,Taiwan) LinearCodeImpliesPublic-KeyTraitorTracing. . . . . . . . . . . . . . . . . . . . . . .".
- catalog alternative "PKC 2002".
- catalog created "2002.".
- catalog date "2002".
- catalog date "2002.".
- catalog dateCopyrighted "2002.".
- catalog description ". . . . . . . RSALaboratories,USA AntoineJoux. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DCSSI,France BurtKaliski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RSALaboratories,USA KwangjoKim . . . . . . . . . . . . InformationandCommunicationsUniversity,Korea EyalKushilevitz. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Technion,Israel PascalPaillier. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Gemplus,France ´ DavidPointcheval . . . . . . . . . . . . . . . . . . . . . . . . . . EcoleNormaleSup´erieure,France Jean-JacquesQuisquater. . . . . . . . . . Universit´eCatholiquedeLouvain,Belgium PhillipRogaway . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UCDavis,USA KazueSako. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ".
- catalog description "159 Wen-GueyTzeng(NationalChiaoTungUniversity,Taiwan) LinearCodeImpliesPublic-KeyTraitorTracing. . . . . . . . . . . . . . . . . . . . . . .".
- catalog description "17 Jean-S´ ebastien Coron (Gemplus, France), Helena Handschuh (Gemplus,France),MarcJoye(Gemplus,France),PascalPaillier ´ (Gemplus,France),DavidPointcheval(EcoleNormaleSup´ erieure,France), ChristopheTymen(Gemplus,France) OnSu?cientRandomnessforSecurePublic-KeyCryptosystems. . . . . . . . . 34 Takeshi Koshiba (Fujitsu Laboratories Ltd, Japan) Multi-recipientPublic-KeyEncryptionwithShortenedCiphertext. . . . . . . . 48 Kaoru Kurosawa (Ibaraki University, Japan) SignatureSchemes E?cientandUnconditionallySecureDigitalSignatures andaSecurityAnalysisofaMultireceiverAuthenticationCode. . . . . . . . . . 64 GoichiroHanaoka(UniversityofTokyo,Japan),JunjiShikata (University of Tokyo, Japan), Yuliang Zheng (UNC Charlotte, USA), HidekiImai(UniversityofTokyo,Japan) FormalProofsfortheSecurityofSigncryption. . . . . . . . . . . . . . . . . . . . . . . . . ".
- catalog description "80 JoonsangBaek(MonashUniversity,Australia),RonSteinfeld(Monash University,Australia),YuliangZheng(UNCCharlotte,USA) AProvablySecureRestrictivePartiallyBlindSignatureScheme. . . . . . . . . 99 GregMaitland(QueenslandUniversityofTechnology,Australia), ColinBoyd(QueenslandUniversityofTechnology,Australia) ProtocolsI M+1-stPriceAuctionUsingHomomorphicEncryption. . . . . . . . . . . . . . . . 115 Masayuki Abe (NTT ISP Labs, Japan), Koutarou Suzuki (NTT ISP Labs,Japan) Client/ServerTradeo?sforOnlineElections. . . . . . . . . . . . . . . . . . . . . . . . . . . 125 Ivan Damg? ard (Aarhus University, Denmark), Mads Jurik (Aarhus University,Denmark) X TableofContents Self-tallyingElectionsandPerfectBallotSecrecy. . . . . . . . . . . . . . . . . . . . . . 141 AggelosKiayias(GraduateCenter,CUNY,USA),MotiYung(CertCo, USA) ProtocolsII E?cient1-Out-nObliviousTransferSchemes. . . . . . . . . . . . . . . . . . . . . . . . . . ".
- catalog description "Encryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- ".
- catalog description "Finally,wewishtothankalltheauthorswhocommittedtheirtimebys- mitting papers (including those whose submissions were not successful), thus makingthisconferencepossible,aswellastheparticipants,organizers,andc- tributorsfromaroundtheworldfortheirkindsupport. December2001 DavidNaccache,PascalPaillier PKC2002 FifthInternationalWorkshop onPracticeandTheory inPublicKeyCryptography MaisondelaChimie,Paris,France February12–14,2002 ProgramCommittee DavidNaccache(ProgramChair). . . . . . . . . . . . . . . . . . . . . . . . . . . . Gemplus,France DanielBleichenbacher. . . . . . . . . . . . . . . . . . . BellLabs,LucentTechnologies,USA YvoDesmedt . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . FloridaStateUniversity,USA MarcFischlin. . . . . . . . . . . . . . . . . . . . . . . Goethe-UniversityofFrankfurt,Germany ShaiHalevi. . . . . . . . . . . . . . . . . . . . . . . . . IBMT. J. WatsonResearchCenter,USA MarkusJakobsson . . . . . . . . . . . . . . . . . . . . . . . . . . . . ".
- catalog description "Inaddition to this program, we were honored to welcome Prof. Bart Preneel who kindly acceptedtogivethisyear’sinvitedtalk. Theprogramcommitteegratefully- knowledgesthehelpofalargenumberofcolleagueswhoreviewedsubmissionsin theirareaofexpertise:MasayukiAbe,SeigoArita,OlivierBaudron,MihirB- lare,EmmanuelBresson,EricBrier,MathieuCiet,AlessandroCon?itti,Jean- S´ebastienCoron,RogerFischlin,Pierre-AlainFouque,MattFranklin,Rosario Genarro,MarcGirault,LouisGranboulan,GoichiroHanaoka,DarrelHank- son, Eliane Jaulmes, Ari Juels, Jinho Kim, Marcos Kiwi, Kazukuni Kobara, Francois Koeune, Byoungcheon Lee, A. K. Lenstra, Pierre Loidreau, Wenbo Mao, Gwenaelle Martinet, Yi Mu, Phong Nguyen, Satoshi Obana, Guillaume Poupard,YasuyukiSakai,HideoShimizu,TomShrimpton,RonSteinfeld,K- suyukiTakashima,HuaxiongWang,andYujiWatanabe. JulienBrouchier- servesspecialthanksforskillfullymaintainingtheprogramcommittee’swebsite andpatientlyhelpingoutduringtherefereeingprocess. ".
- catalog description "Includes bibliographical references and index.".
- catalog description "NECCorporation,Japan BruceSchneier. . . . . . . . . . . . . . . . . . . . . . . . . . . CounterpaneInternetSecurity,USA JunjiShikata. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . UniversityofTokyo,Japan IgorShparlinski . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . MacquarieUniversity,Australia MotiYung . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Certco,USA JianyingZhou. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . OracleCorporation,USA TableofContents EncryptionSchemes NewSemanticallySecurePublic-KeyCryptosystemsfromtheRSA-Primitive 1 KouichiSakurai(KyushuUniversity,Japan),TsuyoshiTakagi (TechnischeUniversit¨ atDarmstadt,Germany) OptimalChosen-CiphertextSecureEncryption ofArbitrary-LengthMessages. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . ".
- catalog description "On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- ".
- catalog description "RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards.".
- catalog description "TheInternationalWorkshoponPracticeandTheoryinPublicKeyCryptog- phyPKC2002washeldattheMaisondelaChimie,situatedintheverycenter ofParis,FrancefromFebruary12to14,2002. ThePKCseriesofconferences yearlyrepresentsinternationalresearchandthelatestachievementsinthearea ofpublickeycryptography,coveringawidespectrumoftopics,fromcryptos- temstoprotocols,implementationtechniquesorcryptanalysis. Afterbeingheld infoursuccessiveyearsinpaci?c-asiancountries,PKC2002experiencedforthe ?rsttimeaEuropeanlocation,thusshowingitsabilitytoreachaneverwider audiencefromboththeindustrialcommunityandacademia. Weareverygratefultothe19membersoftheProgramCommitteefortheir hardande?cientworkinproducingsuchahighqualityprogram. Inresponseto thecallforpapersofPKC2002,69paperswereelectronicallyreceivedfrom13 di?erentcountriesthroughoutEurope,America,andtheFarEast. Allsubm- sionswerereviewedbyatleastthreemembersoftheprogramcommittee,who eventuallyselectedthe26papersthatappearintheseproceedings. ".
- catalog extent "xi, 383 p. :".
- catalog identifier "3540431683 (pbk.)".
- catalog isPartOf "Lecture notes in computer science, 0302-9743 ; 2274".
- catalog issued "2002".
- catalog issued "2002.".
- catalog language "eng".
- catalog publisher "Berlin : Springer,".
- catalog subject "Computer Communication Networks.".
- catalog subject "Computer science.".
- catalog subject "Computer security Congresses.".
- catalog subject "Computer software.".
- catalog subject "Computers Access control Congresses.".
- catalog subject "Data encryption (Computer science) Congresses.".
- catalog subject "Data encryption (Computer science).".
- catalog subject "Public key cryptography Congresses.".
- catalog subject "QA76.9.A25 I567 2002".
- catalog tableOfContents "Encryption Schemes -- New Semantically Secure Public-Key Cryptosystems from the RSA-Primitive -- Optimal Chosen-Ciphertext Secure Encryption of Arbitrary-Length Messages -- On Sufficient Randomness for Secure Public-Key Cryptosystems -- Multi-recipient Public-Key Encryption with Shortened Ciphertext -- Signature Schemes -- Efficient and Unconditionally Secure Digital Signatures and a Security Analysis of a Multireceiver Authentication Code -- Formal Proofs for the Security of Signcryption -- A Provably Secure Restrictive Partially Blind Signature Scheme -- Protocols I -- M + 1-st Price Auction Using Homomorphic Encryption -- Client/Server Tradeoffs for Online Elections -- Self-tallying Elections and Perfect Ballot Secrecy -- Protocols II -- Efficient 1-Out-n Oblivious Transfer Schemes -- Linear Code Implies Public-Key Traitor Tracing -- Design and Security Analysis of Anonymous Group Identification Protocols -- ".
- catalog tableOfContents "On the Security of the Threshold Scheme Based on the Chinese Remainder Theorem -- Cryptanalysis -- Solving Underdefined Systems of Multivariate Quadratic Equations -- Selective Forgery of RSA Signatures with Fixed-Pattern Padding -- New Chosen-Plaintext Attacks on the One-Wayness of the Modified McEliece PKC Proposed at Asiacrypt 2000 -- Side Channels -- SPA-Based Adaptive Chosen-Ciphertext Attack on RSA Implementation -- A Combined Timing and Power Attack -- A Fast Parallel Elliptic Curve Multiplication Resistant against Side Channel Attacks -- Invited Talk -- New European Schemes for Signature, Integrity and Encryption (NESSIE): A Status Report -- ECC Implementations -- An Improved Method of Multiplication on Certain Elliptic Curves -- An Alternate Decomposition of an Integer for Faster Point Multiplication on Certain Elliptic Curves -- Weierstraß Elliptic Curves and Side-Channel Attacks -- Applications -- One-Way Cross-Trees and Their Applications -- ".
- catalog tableOfContents "RSA Key Generation with Verifiable Randomness -- New Minimal Modified Radix-r Representation with Applications to Smart Cards.".
- catalog title "PKC 2002".
- catalog title "Public key cryptography : 4th International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2002, Paris, France, February 12-14, 2002 ; proceedings / David Naccache, Pascal Paillier (eds.).".
- catalog type "text".