Public-Key Cryptography 2005 Les Diablerets, Switzerland
Serge Vaudenay (Ed.):
Public Key Cryptography - PKC 2005,
8th International Workshop on
Theory and Practice in Public Key Cryptography,
Les Diablerets,
Switzerland,
January 23-26, 2005,
Proceedings.
Yvo Desmedt | University College London, United Kingdom | |
Hideki Imai (Chair) | University of Tokyo, Japan | |
Kwangjo Kim | Information and Communications University, Korea | |
David Naccache |
Gemplus, France,
and Royal Holloway, University of London, United Kingdom |
|
Jacques Stern | Ecole Normale Supérieure, France | |
Moti Yung | Columbia University, USA | |
Yuliang Zheng (Secretary) | University of North Carolina at Charlotte, USA | |
Ronald Cramer | CWI and Leiden University, The Netherlands | |
Tatsuaki Okamoto | NTT Labs, Japan |
General Co-Chairs | Jean Monnerat | |
Serge Vaudenay | ||
Local organization | Martine Corval | |
Assistants | Gildas Avoine | |
Thomas Baignères | ||
Matthieu Finiasz | ||
Pascal Junod | ||
Yi Lu |
Carlisle Adams | University of Ottawa, Canada | |
Feng Bao | Institute for Infocomm Research, Singapore | |
Yvo Desmedt | University College London, United Kingdom | |
Juan Garay | Bell Labs -- Lucent Technologies, USA | |
Martin Hirt | ETH Zurich, Switzerland | |
Kwangjo Kim | Information and Communications University, Korea | |
Kaoru Kurosawa | Ibaraki University, Japan | |
Anna Lysyanskaya | Brown University, USA | |
Wenbo Mao | HP Labs Bristol, United Kingdom | |
David Naccache |
Gemplus, France and
and Royal Holloway, University of London, United Kingdom |
|
Kaisa Nyberg | Nokia, Finland | |
Tatsuaki Okamoto | NTT Labs, Japan | |
Josef Pieprzyk | Macquarie University, Australia | |
David Pointcheval | CNRS-ENS, France | |
Reihaneh Safavi-Naini | University of Wollongong, Australia | |
Kazue Sako | NEC, Japan | |
Claus-Peter Schnorr | University of Frankfurt am Main, Germany | |
Berry Schoenmakers | Technische Universiteit Eindhoven, Netherlands | |
Nigel Smart | University of Bristol, United Kingdom | |
Edlyn Teske | University of Waterloo, Canada | |
Serge Vaudenay | EPFL, Switzerland | |
Moti Yung | University of Columbia, USA | |
Yuliang Zheng | University of North Carolina at Charlotte, USA |
External Referees
Cryptanalysis
-
Oded Yacobi
,
Yacov Yacobi
:
A New Related Message Attack on RSA , ( .ps ). 1-8
BibTeX -
Daniel Bleichenbacher
:
Breaking a Cryptographic Protocol with Pseudoprimes , ( .ps ). 9-15
BibTeX -
David Naccache
,
Phong Q. Nguyen
,
Michael Tunstall
,
Claire Whelan
:
Experimenting with Faults, Lattices and the DSA , ( .ps ). 16-28
BibTeX
Key Establishment
-
Jakob Jonsson
,
Matthew J. B. Robshaw
:
Securing RSA-KEM via the AES , ( .ps ). 29-46
BibTeX -
Michel Abdalla
,
Olivier Chevassut
,
David Pointcheval
:
One-Time Verifier-Based Encrypted Key Exchange , ( .ps ). 47-64
BibTeX -
Michel Abdalla
,
Pierre-Alain Fouque
,
David Pointcheval
:
Password-Based Authenticated Key Exchange in the Three-Party Setting , ( .ps ). 65-84
BibTeX
Optimization
-
Werner Schindler
:
On the Optimization of Side-Channel Attacks by Advanced Stochastic Methods , ( .ps ). 85-103
BibTeX -
Kristian Gjøsteen
:
Symmetric Subgroup Membership Problems , ( .ps ). 104-119
BibTeX
Building Blocks
-
Emil Ong
,
John Kubiatowicz
:
Optimizing Robustness While Generating Shared Secret Safe Primes , ( .ps ). 120-137
BibTeX -
Wu-Chuan Yang
,
Dah-Jyh Guan
,
Chi-Sung Laih
:
Fast Multi-computations with Integer Similarity Strategy , ( .ps ). 138-153
BibTeX -
Endre Bangerter
,
Jan Camenisch
,
Ueli M. Maurer
:
Efficient Proofs of Knowledge of Discrete Logarithms and Representations in Groups with Hidden Order , ( .ps ). 154-171
BibTeX -
Cheng-Kang Chu
,
Wen-Guey Tzeng
:
Efficient k -Out-of- n Oblivious Transfer Schemes with Adaptive and Non-adaptive Queries , ( .ps ). 172-183
BibTeX
RSA Cryptography
-
Ron Steinfeld
,
Scott Contini
,
Huaxiong Wang
,
Josef Pieprzyk
:
Converse Results to the Wiener Attack on RSA , ( .ps ). 184-198
BibTeX -
Hung-Min Sun
,
Cheng-Ta Yang
:
RSA with Balanced Short Exponents and Its Application to Entity Authentication , ( .ps ). 199-215
BibTeX -
Ryotaro Hayashi
,
Keisuke Tanaka
:
The Sampling Twice Technique for the RSA-Based Cryptosystems with Anonymity , ( .ps ). 216-233
BibTeX -
Julien Cathalo
,
Jean-Sébastien Coron
,
David Naccache
:
From Fixed-Length to Arbitrary-Length RSA Encoding Schemes Revisited , ( .ps ). 234-243
BibTeX
Multivariate Asymmetric Cryptography
-
Lih-Chung Wang
,
Yuh-Hua Hu
,
Feipei Lai
,
Chun-yen Chou
,
Bo-Yin Yang
:
Tractable Rational Map Signature , ( .ps ). 244-257
BibTeX -
Antoine Joux
,
Sébastien Kunz-Jacques
,
Frédéric Muller
,
Pierre-Michel Ricordel
:
Cryptanalysis of the Tractable Rational Map Cryptosystem , ( .ps ). 258-274
BibTeX -
Christopher Wolf
,
Bart Preneel
:
Large Superfluous Keys in Multivariate Quadratic Asymmetric Systems , ( .ps ). 275-287
BibTeX -
Jintai Ding
,
Dieter Schmidt
:
Cryptanalysis of HFEv and Internal Perturbation of HFE , ( .ps ). 288-301
BibTeX
Signature Schemes
-
Louis Granboulan
:
A Generic Scheme Based on Trapdoor One-Way Permutations with Signatures as Short as Possible , ( .ps ). 302-312
BibTeX -
Dario Catalano
,
Rosario Gennaro
:
Cramer-Damgård Signatures Revisited: Efficient Flat-Tree Signatures Based on Factoring , ( .ps ). 313-327
BibTeX -
Wakaha Ogata
,
Kaoru Kurosawa
,
Swee-Huay Heng
:
The Security of the FDH Variant of Chaum's Undeniable Signature Scheme , ( .ps ). 328-345
BibTeX -
Ivan Damgård
,
Kasper Dupont
:
Efficient Threshold RSA Signatures with General Moduli and No Extra Assumptions , ( .ps ). 346-361
BibTeX
Identity-Based Cryptography
-
Liqun Chen
,
John Malone-Lee
:
Improved Identity-Based Signcryption , ( .ps ). 362-379
BibTeX -
Joonsang Baek
,
Reihaneh Safavi-Naini
,
Willy Susilo
:
Efficient Multi-receiver Identity-Based Encryption and Its Application to Broadcast Encryption , ( .ps ). 380-397
BibTeX -
Sattam S. Al-Riyami
,
Kenneth G. Paterson
:
CBE from CL-PKE: A Generic Construction and Efficient Schemes , ( .ps ). 398-415
BibTeX