Advertisement

Public Key Cryptography – PKC 2007

10th International Conference on Practice and Theory in Public-Key Cryptography Beijing, China, April 16-20, 2007. Proceedings

  • Editors
  • Tatsuaki Okamoto
  • Xiaoyun Wang

Part of the Lecture Notes in Computer Science book series (LNCS, volume 4450)

Table of contents

  1. Front Matter
  2. Signatures I

  3. Invited Talk I

  4. Cryptanalysis

    1. Nicolas Gama, Phong Q. Nguyen
      Pages 89-106
    2. Daewan Han, Myung-Hwan Kim, Yongjin Yeom
      Pages 107-117
  5. Protocols I

    1. Yevgeniy Dodis, Pil Joong Lee, Dae Hyun Yum
      Pages 118-133
    2. Huafei Zhu, Willy Susilo, Yi Mu
      Pages 134-149
  6. Signatures II

    1. Hovav Shacham, Brent Waters
      Pages 166-180
    2. Eiichiro Fujisaki, Koutarou Suzuki
      Pages 181-200
    3. Emmanuel Bresson, Dario Catalano, Rosario Gennaro
      Pages 217-232
  7. Multivariate Cryptosystems

    1. Jintai Ding, Lei Hu, Xuyun Nie, Jianyu Li, John Wagner
      Pages 233-248
    2. Vivien Dubois, Louis Granboulan, Jacques Stern
      Pages 249-265
  8. Encryption

    1. Benoît Libert, Jean-Jacques Quisquater, Moti Yung
      Pages 298-314
    2. Akinori Kawachi, Keisuke Tanaka, Keita Xagawa
      Pages 315-329
  9. Protocols II

    1. Juan Garay, Berry Schoenmakers, José Villegas
      Pages 330-342
    2. Michel Abdalla, Alexander W. Dent, John Malone-Lee, Gregory Neven, Duong Hieu Phan, Nigel P. Smart
      Pages 361-376
    3. Jens Groth, Steve Lu
      Pages 377-392
  10. Invited Talk II

  11. Number Theoretic Techniques

    1. Reza Rezaeian Farashahi, Berry Schoenmakers, Andrey Sidorenko
      Pages 426-441
    2. Jung Hee Cheon, Jeong Hyun Yi
      Pages 442-457
  12. Public-Key Infrastructure

    1. Alexandra Boldyreva, Marc Fischlin, Adriana Palacio, Bogdan Warinschi
      Pages 458-475
  13. Back Matter

About these proceedings

Keywords

DES Private Information Retrieval anonymity authentication cryptanalysis cryptographic algorithms cryptographic protocols cryptography digital signature schemes distributed crypto-computing encryption methods group key exchange identity indentity-based encryption security

Bibliographic information

  • DOI https://doi.org/10.1007/978-3-540-71677-8
  • Copyright Information Springer-Verlag Berlin Heidelberg 2007
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Computer Science
  • Print ISBN 978-3-540-71676-1
  • Online ISBN 978-3-540-71677-8
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace