Public key cryptography - PKC 2006 : 9th International Conference on Theory and Practice in Public Key Cryptography, New York, NY, USA, April 24-26, 2006 : proceedings

Cryptanalysis and Protocol Weaknesses.- New Attacks on RSA with Small Secret CRT-Exponents.- An Attack on a Modified Niederreiter Encryption Scheme.- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.- Distributed Crypto-computing.- Efficient Polynomial Operations in the Shared-Coefficients Setting.- Generic On-Line/Off-Line Threshold Signatures.- Linear Integer Secret Sharing and Distributed Exponentiation.- Encryption Methods.- Encoding-Free ElGamal Encryption Without Random Oracles.- Parallel Key-Insulated Public Key Encryption.- Provably Secure Steganography with Imperfect Sampling.- Cryptographic Hash and Applications.- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.- Number Theory Algorithms.- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve.- Efficient Scalar Multiplication by Isogeny Decompositions.- Curve25519: New Diffie-Hellman Speed Records.- Pairing-Based Cryptography.- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.- Generalization of the Selective-ID Security Model for HIBE Protocols.- Identity-Based Aggregate Signatures.- On the Limitations of the Spread of an IBE-to-PKE Transformation.- Cryptosystems Design and Analysis.- Inoculating Multivariate Schemes Against Differential Attacks.- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.- High-Order Attacks Against the Exponent Splitting Protection.- Signature and Identification.- New Online/Offline Signature Schemes Without Random Oracles.- Anonymous Signature Schemes.- The Power of Identification Schemes.- Authentication and Key Establishment.- Security Analysis of KEA Authenticated Key Exchange Protocol.- SAS-Based Authenticated Key Agreement.- The Twist-AUgmented Technique for Key Exchange.- Password-Based Group Key Exchange in a Constant Number of Rounds.- Multi-party Computation.- Conditional Oblivious Cast.- Efficiency Tradeoffs for Malicious Two-Party Computation.- PKI Techniques.- On Constructing Certificateless Cryptosystems from Identity Based Encryption.- Building Better Signcryption Schemes with Tag-KEMs.- Security-Mediated Certificateless Cryptography.- k-Times Anonymous Authentication with a Constant Proving Cost.