Skip to main content
  • Conference proceedings
  • © 2000

Advances in Cryptology - CRYPTO 2000

20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000. Proceedings

Editors:

Part of the book series: Lecture Notes in Computer Science (LNCS, volume 1880)

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access

This is a preview of subscription content, log in via an institution to check for access.

Table of contents (33 papers)

  1. Front Matter

    Pages I-XI
  2. XTR and NTRU

    1. The XTR Public Key System

      • Arjen K. Lenstra, Eric R. Verheul
      Pages 1-19
    2. A Chosen-Ciphertext Attack against NTRU

      • Éliane Jaulmes, Antoine Joux
      Pages 20-35
  3. Privacy for Databases

    1. Privacy Preserving Data Mining

      • Yehuda Lindell, Benny Pinkas
      Pages 36-54
  4. Secure Distributed Computation and Applications

    1. Optimistic Fair Secure Computation

      • Christian Cachin, Jan Camenisch
      Pages 93-111
    2. A Cryptographic Solution to a Game Theoretic Problem

      • Yevgeniy Dodis, Shai Halevi, Tal Rabin
      Pages 112-130
  5. Algebraic Cryptosystems

    1. Differential Fault Attacks on Elliptic Curve Cryptosystems

      • Ingrid Biehl, Bernd Meyer, Volker Müller
      Pages 131-146
    2. Quantum Public-Key Cryptosystems

      • Tatsuaki Okamoto, Keisuke Tanaka, Shigenori Uchiyama
      Pages 147-165
    3. New Public-Key Cryptosystem Using Braid Groups

      • Ki Hyoung Ko, Sang Jin Lee, Jung Hee Cheon, Jae Woo Han, Ju-sung Kang, Choonsik Park
      Pages 166-183
  6. Message Authentication

    1. Key Recovery and Forgery Attacks on the MacDES MAC Algorithm

      • Don Coppersmith, Lars R. Knudsen, Chris J. Mitchell
      Pages 184-196
    2. L-collision Attacks against Randomized MACs

      • Michael Semanko
      Pages 216-228
  7. Digital Signatures

    1. On the Exact Security of Full Domain Hash

      • Jean-Sébastien Coron
      Pages 229-235
    2. Timed Commitments

      • Dan Boneh, Moni Naor
      Pages 236-254
    3. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme

      • Giuseppe Ateniese, Jan Camenisch, Marc Joye, Gene Tsudik
      Pages 255-270
    4. Provably Secure Partially Blind Signatures

      • Masayuki Abe, Tatsuaki Okamoto
      Pages 271-286
  8. Cryptanalysis

    1. Weaknesses in the SL2(\( \mathbb{F}_{2^n } \)) Hashing Scheme

      • Rainer Steinwandt, Markus Grassl, Willi Geiselmann, Thomas Beth
      Pages 287-299
    2. Fast Correlation Attacks through Reconstruction of Linear Polynomials

      • Thomas Johansson, Fredrik Jönsson
      Pages 300-315

Editors and Affiliations

  • Department of Computer Science and Engineering, University of California, La Jolla, USA

    Mihir Bellare

Bibliographic Information

Buy it now

Buying options

eBook USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Other ways to access