Advances in Cryptology — EUROCRYPT 2001: International - download pdf or read online

By Frederik Vercauteren, Bart Preneel, Joos Vandewalle (auth.), Birgit Pfitzmann (eds.)

ISBN-10: 3540420703

ISBN-13: 9783540420705

ISBN-10: 3540449876

ISBN-13: 9783540449874

EUROCRYPT 2001, the twentieth annual Eurocrypt convention, was once backed by way of the IACR, the foreign organization for Cryptologic study, see http://www. iacr. org/, this 12 months in cooperation with the Austrian machine - ciety (OCG). the overall Chair, Reinhard Posch, was once accountable for neighborhood or- nization, and registration used to be dealt with via the IACR Secretariat on the collage of California, Santa Barbara. as well as the papers contained in those court cases, we have been happy that the convention software additionally incorporated a presentation by means of the 2001 IACR d- tinguished lecturer, Andrew Odlyzko, on “Economics and Cryptography” and an invited speak via Silvio Micali, “Zero wisdom Has Come of Age. ” additionally, there has been the rump consultation for displays of modern effects and different (p- sibly satirical) issues of curiosity to the crypto group, which Jean-Jacques Quisquater kindly agreed to run. this system Committee obtained a hundred and fifty five submissions and chosen 33 papers for presentation; considered one of them was once withdrawn by way of the authors. The evaluation procedure was once hence a fragile and difficult activity for the committee contributors, and that i desire to thank them for the entire e?ort they spent on it. every one committee member was once chargeable for the overview of not less than 20 submissions, so every one paper was once rigorously evaluated by way of not less than 3 reviewers, and submissions with a software committee member as a (co-)author via no less than six.

Show description

Read or Download Advances in Cryptology — EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings PDF

Similar international_1 books

Selected Areas in Cryptography: 5th Annual International - download pdf or read online

AC’98 A C - . AC’94 AC’96 ’ ! ok AC’95 AC’97 C ! O . & . I - * . & * AC’98 : • D A ** okay C * • E? I* * C * • C I • /M N O 39 * AC’98,26 - * . & ! , A M okay A * E B * I O ! J :C J -3

Download e-book for kindle: Information Security: 11th International Conference, ISC by Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy

This publication constitutes the refereed court cases of the eleventh foreign convention on info protection convention, ISC 2008, held in Taipei, Taiwan, September 15-18, 2008. The 33 revised complete papers provided have been rigorously reviewed and chosen from 134 submissions. The papers are prepared in topical sections on depended on computing, database and process safeguard, intrusion detection, community defense, cryptanalysis, electronic signatures, AES, symmetric cryptography and hash capabilities, authentication in addition to safeguard protocols.

Logical Foundations of Computer Science: International by Sergei Artemov, Anil Nerode PDF

This e-book constitutes the refereed complaints of the foreign Symposium on Logical Foundations of computing device technology, LFCS 2016, held in Deerfield seashore, FL, united states in January 2016. The 27 revised complete papers have been rigorously reviewed and chosen from forty six submissions. The scope of the Symposium is extensive and comprises confident arithmetic and kind concept; homotopy kind thought; good judgment, automata, and automated buildings; computability and randomness; logical foundations of programming; logical points of computational complexity; parameterized complexity; common sense programming and constraints; computerized deduction and interactive theorem proving; logical equipment in protocol and software verification; logical tools in application specification and extraction; area thought logics; logical foundations of database thought; equational common sense and time period rewriting; lambda and combinatory calculi; express good judgment and topological semantics; linear good judgment; epistemic and temporal logics; clever and multiple-agent process logics; logics of facts and justification; non-monotonic reasoning; common sense in online game idea and social software program; good judgment of hybrid structures; allotted approach logics; mathematical fuzzy good judgment; procedure layout logics; and different logics in computing device technological know-how.

Extra info for Advances in Cryptology — EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings

Sample text

By extrapolating the work required to larger sizes and allowing safety margins for future increases in computing power, it is generally believed (see [FIPS186], [LV00], [P1363], [Sil00]) that a random curve whose order is divisible by a prime of at least 160 bits will offer reasonable security, comparable to 80-bit symmetric systems or 1024-bit RSA. For applications with the highest security requirements, one may take larger safety margins. To find a secure curve, Lercier [Ler97a] proposed an early-abort strategy to use when computing the cardinality of the curve using SEA.

However in small characteristic Satoh’s algorithm is efficient. In particular in characteristic two, Satoh-FGH is clearly faster than SEA in practice. To illustrate the difference in speed between the two algorithms, we compare Lercier’s results [Ler97b] with the timings we get over the same fields, using an identical 266 MHz Alpha. The results are given in Table 3. We do not give minimal or maximal times for Satoh-FGH since the runtime of this algorithm is essentially constant when treating different curves over the same field.

Smart. Elliptic Curves in Cryptography. Cambridge University Press, 1999. 5. G. Frey. How to disguise an elliptic curve. Talk at Waterloo workshop on the ECDLP, 1998. html 6. D. P. Smart. A cryptographic application of Weil descent. Cryptography and Coding, 7th IMA Conference, Springer-Verlag, LNCS 1746, 191– 200, 1999. The full version of the paper is HP Labs Technical Report, HPL-1999-70. 7. P. Gaudry. An algorithm for solving the discrete logarithm problem on hyperelliptic curves. In Advances in Cryptology - EUROCRYPT 2000, Springer-Verlag LNCS 1807, 19–34, 2000.

Download PDF sample

Advances in Cryptology — EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings by Frederik Vercauteren, Bart Preneel, Joos Vandewalle (auth.), Birgit Pfitzmann (eds.)


by David
4.3

Rated 4.12 of 5 – based on 48 votes

About the Author

admin