Coverart for item
The Resource Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)

Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)

Label
Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings
Title
Progress in cryptology
Title remainder
INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings
Statement of responsibility
Alfred Menezes, Palash Sarkar (eds.)
Title variation
INDOCRYPT 2002
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002. The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer
Member of
Cataloging source
COO
Dewey number
005.8/2
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I5535 2002
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2002
http://bibfra.me/vocab/lite/meetingName
International Conference in Cryptology in India
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorDate
  • 1965-
  • 1969-
http://library.link/vocab/relatedWorkOrContributorName
  • Menezes, A. J.
  • Sarkar, Palash
Series statement
Lecture notes in computer science
Series volume
2551
http://library.link/vocab/subjectName
  • Computer security
  • Cryptography
  • Computer security
  • Cryptography
Label
Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Invited Talks -- Security of a Wide Trail Design -- Fast Algorithms for Determining the Linear Complexity of Period Sequences -- Symmetric Ciphers -- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures -- Slide Attack on Spectr-H64 -- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract) -- New Public-Key Schemes -- A Variant of NTRU with Non-invertible Polynomials -- Tree Replacement and Public Key Cryptosystem -- Foundations -- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System -- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement -- Public-Key Infrastructures -- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI) -- Towards Logically and Physically Secure Public-Key Infrastructures -- Fingerprinting and Watermarking -- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme -- A 2-Secure Code with Efficient Tracing Algorithm -- Reed Solomon Codes for Digital Fingerprinting -- Public-Key Protocols -- A Note on the Malleability of the El Gamal Cryptosystem -- Authentication of Concast Communication -- Self-certified Signatures -- Identity Based Authenticated Group Key Agreement Protocol -- Boolean Functions -- Construction of Cryptographically Important Boolean Functions -- Evolving Boolean Functions Satisfying Multiple Criteria -- Further Results Related to Generalized Nonlinearity -- Efficient and Secure Implementations -- Modular Multiplication in GF(pk) Using Lagrange Representation -- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map -- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks -- Applications -- The Design and Implementation of Improved Secure Cookies Based on Certificate -- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority -- Spending Offline Divisible Coins with Combining Capability -- Efficient Object-Based Stream Authentication -- Anonymity -- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem -- New Identity Escrow Scheme for Anonymity Authentication -- Secret Sharing and Oblivious Transfer -- On Unconditionally Secure Distributed Oblivious Transfer -- Non-perfect Secret Sharing over General Access Structures -- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure
Control code
51277557
Dimensions
unknown
Extent
1 online resource (xi, 435 pages)
Form of item
online
Isbn
9783540362319
Lccn
2002042654
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-36231-2
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)51277557
Label
Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings, Alfred Menezes, Palash Sarkar (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Invited Talks -- Security of a Wide Trail Design -- Fast Algorithms for Determining the Linear Complexity of Period Sequences -- Symmetric Ciphers -- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures -- Slide Attack on Spectr-H64 -- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract) -- New Public-Key Schemes -- A Variant of NTRU with Non-invertible Polynomials -- Tree Replacement and Public Key Cryptosystem -- Foundations -- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System -- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement -- Public-Key Infrastructures -- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI) -- Towards Logically and Physically Secure Public-Key Infrastructures -- Fingerprinting and Watermarking -- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme -- A 2-Secure Code with Efficient Tracing Algorithm -- Reed Solomon Codes for Digital Fingerprinting -- Public-Key Protocols -- A Note on the Malleability of the El Gamal Cryptosystem -- Authentication of Concast Communication -- Self-certified Signatures -- Identity Based Authenticated Group Key Agreement Protocol -- Boolean Functions -- Construction of Cryptographically Important Boolean Functions -- Evolving Boolean Functions Satisfying Multiple Criteria -- Further Results Related to Generalized Nonlinearity -- Efficient and Secure Implementations -- Modular Multiplication in GF(pk) Using Lagrange Representation -- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map -- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks -- Applications -- The Design and Implementation of Improved Secure Cookies Based on Certificate -- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority -- Spending Offline Divisible Coins with Combining Capability -- Efficient Object-Based Stream Authentication -- Anonymity -- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem -- New Identity Escrow Scheme for Anonymity Authentication -- Secret Sharing and Oblivious Transfer -- On Unconditionally Secure Distributed Oblivious Transfer -- Non-perfect Secret Sharing over General Access Structures -- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure
Control code
51277557
Dimensions
unknown
Extent
1 online resource (xi, 435 pages)
Form of item
online
Isbn
9783540362319
Lccn
2002042654
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/3-540-36231-2
Other physical details
illustrations.
Specific material designation
remote
System control number
(OCoLC)51277557

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
Processing Feedback ...