{"title":"Fault Attacks on Public Key Elements: Application to DLP-Based Schemes","authors":"Chong Hee Kim, P. Bulens, C. Petit, J. Quisquater","doi":"10.1007/978-3-540-69485-4_13","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_13","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"130 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127098911","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Efficient Generic Forward-Secure Signatures and Proxy Signatures","authors":"Basel Alomair, K. Sampigethaya, R. Poovendran","doi":"10.1007/978-3-540-69485-4_12","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_12","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127909846","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An Efficient and Provable Secure Identity-Based Identification Scheme in the Standard Model","authors":"Ji-Jian Chin, Swee-Huay Heng, B. Goi","doi":"10.1007/978-3-540-69485-4_5","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_5","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126714361","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Fast Point Decompression for Standard Elliptic Curves","authors":"B. Brumley, K. Järvinen","doi":"10.1007/978-3-540-69485-4_10","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_10","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129932078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PEACHES and Peers","authors":"Massimiliano Pala, Sean W. Smith","doi":"10.1007/978-3-540-69485-4_16","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_16","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"98 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124086153","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ricardo Felipe Custódio, M. Vigil, Juliano Romani, F. C. Pereira, J. Fraga
{"title":"Optimized Certificates - A New Proposal for Efficient Electronic Document Signature Validation","authors":"Ricardo Felipe Custódio, M. Vigil, Juliano Romani, F. C. Pereira, J. Fraga","doi":"10.1007/978-3-540-69485-4_4","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_4","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"264 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122929062","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López, A. Gómez-Skarmeta
{"title":"Levels of Assurance and Reauthentication in Federated Environments","authors":"Manuel Sánchez, Óscar Cánovas Reverte, Gabriel López, A. Gómez-Skarmeta","doi":"10.1007/978-3-540-69485-4_7","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_7","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127296660","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Privacy-Preserving eHealth Protocol Compliant with the Belgian Healthcare System","authors":"B. Decker, M. Layouni, H. Vangheluwe, K. Verslype","doi":"10.1007/978-3-540-69485-4_9","DOIUrl":"https://doi.org/10.1007/978-3-540-69485-4_9","url":null,"abstract":"","PeriodicalId":420549,"journal":{"name":"European Public Key Infrastructure Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2008-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130713122","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}