Download Advances in Cryptology — ASIACRYPT 2002: 8th International by Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang PDF

By Arjen K. Lenstra, Adi Shamir, Jim Tomlinson (auth.), Yuliang Zheng (eds.)

This booklet constitutes the refereed lawsuits of the eighth foreign convention at the idea and alertness of Cryptology and knowledge safety, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised complete papers provided including invited contributions have been rigorously reviewed and chosen from 173 submissions at the foundation of 875 evaluate reviews. The papers are prepared in topical sections on public key cryptography, authentication, conception, block ciphers, disbursed cryptography, cryptanalysis, public key cryptanalysis, mystery sharing, electronic signatures, functions, Boolean features, key administration, and ID-based cryptography.

Show description

Read or Download Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings PDF

Best international_1 books

International Handbook of Personal Construct Psychology

Own build Psychology (PCP) used to be devised by means of George Kelly in 1955 as a brand new technique in psychotherapy. on the grounds that then, his suggestions were utilized commonly all through psychology and past, to incorporate parts as different as nursing, clash solution, sociology and literary feedback. This guide brings jointly, for the 1st time, quite a lot of theories, study and perform that experience grown out of Kelly's unique idea.

Cryptology and Network Security: 13th International Conference, CANS 2014, Heraklion, Crete, Greece, October 22-24, 2014. Proceedings

This publication constitutes the refereed complaints of the thirteenth foreign convention on Cryptology and community safety, CANS 2014, held in Heraklion, Creete, Greece, in October 2014. The 25 revised complete papers offered including the abstracts of three invited talks have been rigorously reviewed and chosen from 86 submissions.

Mobile, Secure, and Programmable Networking: Second International Conference, MSPN 2016, Paris, France, June 1-3, 2016, Revised Selected Papers

This booklet constitutes the completely refereed post-conference court cases of the second one foreign convention on cellular, safe and Programmable Networking, held in Paris, France, This booklet constitutes the completely refereed post-conference lawsuits of the second one foreign convention on cellular, safe and Programmable Networking, held in Paris, France, in June 2016.

Additional info for Advances in Cryptology — ASIACRYPT 2002: 8th International Conference on the Theory and Application of Cryptology and Information Security Queenstown, New Zealand, December 1–5, 2002 Proceedings

Example text

ASIACRYPT 2002, LNCS 2501, pp. 27–45, 2002. c Springer-Verlag Berlin Heidelberg 2002 28 Stefan Lucks this paper, we deal with another variation, based on the Diffie-Hellman problem in specific groups of non-prime order. Set N = P Q, P = 2p + 1, Q = 2q + 1, p = q, and let P , Q, p, and q be odd primes. In the remainder of this paper, we assume N to be of that form. Consider the group QRN of the Quadratic Residues mod N and the CramerShoup Cryptosystem in this group. ) As it will turn out, the legal user will not need to know the factorisation of N for either encryption, decryption or key generation (with the possible exception of generating an appropriate N itself).

Assume g2 to be a generator for QRN . ) Let the ciphertext (U1 , U2 , T ) be invalid. Thus, R1 = R2 exist with U1 = g R1 and U2 = g2R2 . To answer the query, the values K = U1z1 U2z2 (or K = U1z ), A = H(U1 , U2 ), and T = U1x1 +y1 A U2x2 +y2 A = g R1 x1 +R1 y1 A g2R2 x2 +R2 y2 A are computed, which provides the equation lT := logg (T ) = R1 x1 + R1 y1 A + wR2 x2 + wR2 y2 A . (3) Equations 1 and 2 can be used to eliminate the variables x1 and y1 : lT = R1 lc − R1 wx2 + R1 ld A − R1 wy2 A + wR2 x2 + wR2 y2 A = R1 lc + R1 ld A + wx2 (R2 − R1 ) + wy2 A (R2 − R1 ) 7 It is vital that lc and ld are uniquely defined.

However, usually the uj are chosen to have weight 1 or 2, so the cost of computing these inner products can be kept very low. Also, note that the number of routed messages is now doubled, because previously only half the nodes sent non-nil messages. However, empirically it appears that the clockwise transposition routing algorithm handles the full load without any slowdown. It remains to determine the optimal values of K and ρ. This involves implementation details and technological quirks, and obtaining precise figures appears rather hard.

Download PDF sample

Rated 4.72 of 5 – based on 25 votes

admin