The Resource Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)
Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)
Resource Information
The item Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 1 library branch.
- Summary
- This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer
- Language
- eng
- Extent
- 1 online resource (xi, 435 pages)
- Contents
-
- Invited Talks
- Security of a Wide Trail Design
- Fast Algorithms for Determining the Linear Complexity of Period Sequences
- Symmetric Ciphers
- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures
- Slide Attack on Spectr-H64
- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract)
- New Public-Key Schemes
- A Variant of NTRU with Non-invertible Polynomials
- Tree Replacement and Public Key Cryptosystem
- Foundations
- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System
- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement
- Public-Key Infrastructures
- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)
- Towards Logically and Physically Secure Public-Key Infrastructures
- Fingerprinting and Watermarking
- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme
- A 2-Secure Code with Efficient Tracing Algorithm
- Reed Solomon Codes for Digital Fingerprinting
- Public-Key Protocols
- A Note on the Malleability of the El Gamal Cryptosystem
- Authentication of Concast Communication
- Self-certified Signatures
- Identity Based Authenticated Group Key Agreement Protocol
- Boolean Functions
- Construction of Cryptographically Important Boolean Functions
- Evolving Boolean Functions Satisfying Multiple Criteria
- Further Results Related to Generalized Nonlinearity
- Efficient and Secure Implementations
- Modular Multiplication in GF(pk) Using Lagrange Representation
- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
- Applications
- The Design and Implementation of Improved Secure Cookies Based on Certificate
- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
- Spending Offline Divisible Coins with Combining Capability
- Efficient Object-Based Stream Authentication
- Anonymity
- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem
- New Identity Escrow Scheme for Anonymity Authentication
- Secret Sharing and Oblivious Transfer
- On Unconditionally Secure Distributed Oblivious Transfer
- Non-perfect Secret Sharing over General Access Structures
- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure
- Isbn
- 9783540362319
- Label
- Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings
- Title
- Progress in cryptology
- Title remainder
- INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings
- Statement of responsibility
- Alfred Menezes, Palash Sarkar (eds.)
- Title variation
- INDOCRYPT 2002
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer
- Cataloging source
- COO
- Dewey number
- 005.8/2
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I5535 2002
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2002
- http://bibfra.me/vocab/lite/meetingName
- International Conference in Cryptology in India
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
-
- 1965-
- 1969-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Menezes, A. J.
- Sarkar, Palash
- Series statement
- Lecture notes in computer science
- Series volume
- 2551
- http://library.link/vocab/subjectName
-
- Computer security
- Cryptography
- Computer security
- Cryptography
- Label
- Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Invited Talks -- Security of a Wide Trail Design -- Fast Algorithms for Determining the Linear Complexity of Period Sequences -- Symmetric Ciphers -- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures -- Slide Attack on Spectr-H64 -- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract) -- New Public-Key Schemes -- A Variant of NTRU with Non-invertible Polynomials -- Tree Replacement and Public Key Cryptosystem -- Foundations -- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System -- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement -- Public-Key Infrastructures -- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI) -- Towards Logically and Physically Secure Public-Key Infrastructures -- Fingerprinting and Watermarking -- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme -- A 2-Secure Code with Efficient Tracing Algorithm -- Reed Solomon Codes for Digital Fingerprinting -- Public-Key Protocols -- A Note on the Malleability of the El Gamal Cryptosystem -- Authentication of Concast Communication -- Self-certified Signatures -- Identity Based Authenticated Group Key Agreement Protocol -- Boolean Functions -- Construction of Cryptographically Important Boolean Functions -- Evolving Boolean Functions Satisfying Multiple Criteria -- Further Results Related to Generalized Nonlinearity -- Efficient and Secure Implementations -- Modular Multiplication in GF(pk) Using Lagrange Representation -- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map -- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks -- Applications -- The Design and Implementation of Improved Secure Cookies Based on Certificate -- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority -- Spending Offline Divisible Coins with Combining Capability -- Efficient Object-Based Stream Authentication -- Anonymity -- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem -- New Identity Escrow Scheme for Anonymity Authentication -- Secret Sharing and Oblivious Transfer -- On Unconditionally Secure Distributed Oblivious Transfer -- Non-perfect Secret Sharing over General Access Structures -- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure
- Control code
- 51277557
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 435 pages)
- Form of item
- online
- Isbn
- 9783540362319
- Lccn
- 2002042654
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/3-540-36231-2
- Other physical details
- illustrations.
- Specific material designation
- remote
- System control number
- (OCoLC)51277557
- Label
- Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Invited Talks -- Security of a Wide Trail Design -- Fast Algorithms for Determining the Linear Complexity of Period Sequences -- Symmetric Ciphers -- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures -- Slide Attack on Spectr-H64 -- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract) -- New Public-Key Schemes -- A Variant of NTRU with Non-invertible Polynomials -- Tree Replacement and Public Key Cryptosystem -- Foundations -- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System -- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement -- Public-Key Infrastructures -- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI) -- Towards Logically and Physically Secure Public-Key Infrastructures -- Fingerprinting and Watermarking -- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme -- A 2-Secure Code with Efficient Tracing Algorithm -- Reed Solomon Codes for Digital Fingerprinting -- Public-Key Protocols -- A Note on the Malleability of the El Gamal Cryptosystem -- Authentication of Concast Communication -- Self-certified Signatures -- Identity Based Authenticated Group Key Agreement Protocol -- Boolean Functions -- Construction of Cryptographically Important Boolean Functions -- Evolving Boolean Functions Satisfying Multiple Criteria -- Further Results Related to Generalized Nonlinearity -- Efficient and Secure Implementations -- Modular Multiplication in GF(pk) Using Lagrange Representation -- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map -- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks -- Applications -- The Design and Implementation of Improved Secure Cookies Based on Certificate -- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority -- Spending Offline Divisible Coins with Combining Capability -- Efficient Object-Based Stream Authentication -- Anonymity -- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem -- New Identity Escrow Scheme for Anonymity Authentication -- Secret Sharing and Oblivious Transfer -- On Unconditionally Secure Distributed Oblivious Transfer -- Non-perfect Secret Sharing over General Access Structures -- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure
- Control code
- 51277557
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 435 pages)
- Form of item
- online
- Isbn
- 9783540362319
- Lccn
- 2002042654
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/3-540-36231-2
- Other physical details
- illustrations.
- Specific material designation
- remote
- System control number
- (OCoLC)51277557
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2002--Third/sw4hAwTgL9M/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2002--Third/sw4hAwTgL9M/">Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2002--Third/sw4hAwTgL9M/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2002--Third/sw4hAwTgL9M/">Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>