Advertisement

Public Key Cryptography

Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000. Proceedings

  • Hideki Imai
  • Yuliang Zheng
Conference proceedings PKC 2000

Part of the Lecture Notes in Computer Science book series (LNCS, volume 1751)

Table of contents

  1. Front Matter
  2. Detlef Hühnlein, Johannes Merkle
    Pages 14-27
  3. Jaroslaw Pastuszak, Dariusz Michałek, Josef Pieprzyk, Jennifer Seberry
    Pages 28-45
  4. Jianying Zhou, Robert Deng, Feng Bao
    Pages 46-57
  5. Seigo Arita
    Pages 58-67
  6. William D. Banks, Daniel Lieman, Igor E. Shparlinski
    Pages 68-74
  7. Chuchang Liu, Maris A. Ozols, Marie Henderson, Tony Cant
    Pages 75-92
  8. Guillaume Poupard, Jacques Stern
    Pages 147-166
  9. X. Y. Wang, L. C. Hui, K. P. Chow, W. W. Tsang, C. F. Chong, H. W. Chan
    Pages 167-177
  10. Sang Uk Shin, Weon Shin, Kyung Hyune Rhee
    Pages 178-195
  11. Wu Wen, Takamichi Saito, Fumio Mizoguchi
    Pages 196-209
  12. Tetsuya Izu, Jun Kogure, Kazuhiro Yokoyama
    Pages 210-222
  13. Juanma González Nieto, DongGook Park, Colin Boyd, Ed Dawson
    Pages 223-237
  14. Katsuyuki Okeya, Hiroyuki Kurumatani, Kouichi Sakurai
    Pages 238-257
  15. Ernest Brickell, David Pointcheval, Serge Vaudenay, Moti Yung
    Pages 276-292
  16. Ahto Buldas, Helger Lipmaa, Berry Schoenmakers
    Pages 293-305
  17. Yair Frankel, Philip MacKenzie, Moti Yung
    Pages 306-325
  18. Adam Young, Moti Yung
    Pages 326-341
  19. Irene Gassko, Peter S. Gemmell, Philip MacKenzie
    Pages 342-353
  20. Ronald Cramer, Ivan Damgård, Philip MacKenzie
    Pages 354-372
  21. Philip Bohannon, Markus Jakobsson, Sukamol Srikwan
    Pages 373-390
  22. Chae Hoon Lim, Hyo Sun Hwang
    Pages 405-421
  23. DongGook Park, Colin Boyd, Sang-Jae Moon
    Pages 433-445
  24. Arjen K. Lenstra, Eric R. Verheul
    Pages 446-465
  25. Mike Burmester, Yvo Desmedt, Hiroshi Doi, Masahiro Mambo, Eiji Okamoto, Mitsuru Tada et al.
    Pages 466-483
  26. Back Matter

About these proceedings

Keywords

Authentication Cryptographic Protocols Digital Signatures Elliptic Curve Cryptography Public Key Cryptography Public Key Cryptosystems Shared Cryptography cryptography security

Editors and affiliations

  • Hideki Imai
    • 1
  • Yuliang Zheng
    • 2
  1. 1.National Institute of Advanced Industrial Science and Technology (AIST)Research Center for Information Security (RCIS) 
  2. 2.Department of Software & Information SystemsThe University of North Carolina at CharlotteCharlotteUSA

Bibliographic information

  • DOI https://doi.org/10.1007/b75033
  • Copyright Information Springer-Verlag Berlin Heidelberg 2000
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-66967-8
  • Online ISBN 978-3-540-46588-1
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site
Industry Sectors
Pharma
Automotive
Biotechnology
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Law
Aerospace
Engineering