Advertisement

Public Key Cryptography — PKC 2003

6th International Workshop on Practice and Theory in Public Key Cryptography Miami, FL, USA, January 6–8, 2003 Proceedings

  • Yvo G. Desmedt

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2567)

Table of contents

  1. Front Matter
    Pages I-XI
  2. Diffie-Hellman Based Schemes

  3. Threshold Cryptography

  4. Reduction Proofs

    1. Mats Näslund, Igor E. Shparlinski, William Whyte
      Pages 62-70
  5. Broadcast and Tracing

    1. Mihir Bellare, Alexandra Boldyreva, Jessica Staddon
      Pages 85-99
  6. Digital Signatures

    1. Yevgeniy Dodis, Jonathan Katz, Shouhuai Xu, Moti Yung
      Pages 130-144
  7. Specialized Multiparty Cryptography

    1. Colin Boyd, Juan Manuel González Nieto
      Pages 161-174
  8. Cryptanalysis I

    1. Christian Tobias
      Pages 175-186
    2. Dennis Hofheinz, Rainer Steinwandt
      Pages 187-198
  9. Elliptic Curves:Implementation Attacks

    1. Adrian Antipa, Daniel Brown, Alfred Menezes, René Struik, Scott Vanstone
      Pages 211-223
    2. Tetsuya Izu, Tsuyoshi Takagi
      Pages 224-239
  10. Implementation and Hardware Issues

    1. Willi Geiselmann, Rainer Steinwandt
      Pages 254-266
    2. Mehdi-Laurent Akkar, Nicolas T. Courtois, Romain Duteuil, Louis Goubin
      Pages 267-278
  11. New Public Key Schemes

    1. David Galindo, Sebastiá Martýn, Paz Morillo, Jorge L. Villar
      Pages 279-291
    2. Seong-Hun Paeng, Bae Eun Jung, Kil-Chan Ha
      Pages 292-308
  12. Elliptic Curves:General Issues

    1. Serge Vaudenay
      Pages 309-323
  13. Cryptanalysis II

    1. Nicolas T. Courtois, Magnus Daum, Patrick Felke
      Pages 337-350
    2. Nicolas T. Courtois
      Pages 351-364
  14. Back Matter
    Pages 365-365

About these proceedings

Introduction

PKC 2003 was the Sixth International Workshop on Practice and Theory in Public Key Cryptography and was sponsored by IACR, the International As- ciation for Cryptologic Research (www.iacr.org). This year the workshop was organized in cooperation with the Department of Computer Science, Florida State University. The General Chair, Mike Burmester was responsible for local organization, registration, etc. There were 105 submitted papers which were considered by the Program Committee. This is an increase of 52% compared to PKC 2002, which took place in Paris, France, February 2002, and which was incorrectly identi?ed on the cover of the proceedings as being the fourth workshop. Due to the large number of submissions, some papers that contained new ideas had to be rejected. Priority was given to novel papers. Of the 105 submissions, 26 were selected for the proceedings. These contain the revised versions of the accepted papers. Each paper was sent to at least 3 members of the program committee for comments. Revisions were not checked for correctness of their scienti?c aspects and the authors bear full responsibility for the contents of their papers. Some authors will write ?nal versions of their papers for publication in refereed journals. I am very grateful to the members of the Program Committee for their hard work in the di?cult task of selecting roughly 1 out of 4 of the submitted papers.

Keywords

Assymetric Cryptography Cryptanalysis Elliptic Curve cryptography IT security Key Agreement Public Key Public Key Cryptosystems Public Key Infrastructure RSA Sflash Signatur Text cryptography identity security

Editors and affiliations

  • Yvo G. Desmedt
    • 1
  1. 1.Department of Computer ScienceFlorida State UniversityTallahasseeUSA

Bibliographic information

  • DOI https://doi.org/10.1007/3-540-36288-6
  • Copyright Information Springer-Verlag Berlin Heidelberg 2002
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-00324-3
  • Online ISBN 978-3-540-36288-3
  • Series Print ISSN 0302-9743
  • Buy this book on publisher's site
Industry Sectors
Automotive
Finance, Business & Banking
Electronics
IT & Software
Telecommunications
Consumer Packaged Goods
Aerospace