The Resource Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
Resource Information
The item Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Language
- eng
- Extent
- 1 online resource (xiv, 429 pages)
- Contents
-
- Invited Talks
- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects
- Secure Protocols for Complex Tasks in Complex Environments
- Cryptographic Protocols
- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model
- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations
- Applications
- On the Security of a Certified E-Mail Scheme
- Multiplicative Homomorphic E-Voting
- Stream Ciphers
- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers
- Algebraic Attacks over GF(q)
- Cryptographic Boolean Functions
- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions
- Generalized Boolean Bent Functions
- On Boolean Functions with Generalized Cryptographic Properties
- Foundations
- Information Theory and the Security of Binary Data Perturbation
- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption
- Block Ciphers
- Faster Variants of the MESH Block Ciphers
- Related-Key Attacks on Reduced Rounds of SHACAL-2
- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H
- Cryptanalysis of Ake98
- Public Key Encryption
- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes
- HEAD: Hybrid Encryption with Delegated Decryption Capability
- A Provably Secure Elliptic Curve Scheme with Fast Encryption
- Efficient Representations
- Advances in Alternative Non-adjacent Form Representations
- Public Key Cryptanalysis
- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups
- Exact Analysis of Montgomery Multiplication
- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem
- Modes of Operation
- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data
- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA
- The Security and Performance of the Galois/Counter Mode (GCM) of Operation
- Signatures
- Revisiting Fully Distributed Proxy Signature Schemes
- New ID-Based Threshold Signature Scheme from Bilinear Pairings
- Separable Linkable Threshold Ring Signatures
- Traitor Tracing and Visual Cryptography
- A New Black and White Visual Cryptographic Scheme for General Access Structures
- Identification Algorithms for Sequential Traitor Tracing
- Isbn
- 9783540305569
- Label
- Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings
- Title
- Progress in cryptology
- Title remainder
- INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings
- Statement of responsibility
- Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
- Title variation
-
- INDOCRYPT 2004
- 5th International Conference on Cryptology in India
- Fifth International Conference on Cryptology in India
- International Conference on Cryptology in India
- Language
- eng
- Cataloging source
- GW5XE
- Dewey number
- 005.8
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I5535 2004
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2004
- http://bibfra.me/vocab/lite/meetingName
- International Conference in Cryptology in India
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Canteaut, Anne
- Viswanathan, Kapaleeswaran
- Series statement
- Lecture notes in computer science,
- Series volume
- 3348
- http://library.link/vocab/subjectName
-
- Computer security
- Cryptography
- Informatique
- Computer security
- Cryptography
- Cryptographie (Informatique)
- Label
- Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail Scheme -- Multiplicative Homomorphic E-Voting -- Stream Ciphers -- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers -- Algebraic Attacks over GF(q) -- Cryptographic Boolean Functions -- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions -- Generalized Boolean Bent Functions -- On Boolean Functions with Generalized Cryptographic Properties -- Foundations -- Information Theory and the Security of Binary Data Perturbation -- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption -- Block Ciphers -- Faster Variants of the MESH Block Ciphers -- Related-Key Attacks on Reduced Rounds of SHACAL-2 -- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H -- Cryptanalysis of Ake98 -- Public Key Encryption -- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes -- HEAD: Hybrid Encryption with Delegated Decryption Capability -- A Provably Secure Elliptic Curve Scheme with Fast Encryption -- Efficient Representations -- Advances in Alternative Non-adjacent Form Representations -- Public Key Cryptanalysis -- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Exact Analysis of Montgomery Multiplication -- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem -- Modes of Operation -- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data -- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA -- The Security and Performance of the Galois/Counter Mode (GCM) of Operation -- Signatures -- Revisiting Fully Distributed Proxy Signature Schemes -- New ID-Based Threshold Signature Scheme from Bilinear Pairings -- Separable Linkable Threshold Ring Signatures -- Traitor Tracing and Visual Cryptography -- A New Black and White Visual Cryptographic Scheme for General Access Structures -- Identification Algorithms for Sequential Traitor Tracing
- Control code
- 324999335
- Dimensions
- unknown
- Extent
- 1 online resource (xiv, 429 pages)
- Form of item
- online
- Isbn
- 9783540305569
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24130-0
- Specific material designation
- remote
- System control number
- (OCoLC)324999335
- Label
- Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail Scheme -- Multiplicative Homomorphic E-Voting -- Stream Ciphers -- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers -- Algebraic Attacks over GF(q) -- Cryptographic Boolean Functions -- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions -- Generalized Boolean Bent Functions -- On Boolean Functions with Generalized Cryptographic Properties -- Foundations -- Information Theory and the Security of Binary Data Perturbation -- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption -- Block Ciphers -- Faster Variants of the MESH Block Ciphers -- Related-Key Attacks on Reduced Rounds of SHACAL-2 -- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H -- Cryptanalysis of Ake98 -- Public Key Encryption -- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes -- HEAD: Hybrid Encryption with Delegated Decryption Capability -- A Provably Secure Elliptic Curve Scheme with Fast Encryption -- Efficient Representations -- Advances in Alternative Non-adjacent Form Representations -- Public Key Cryptanalysis -- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Exact Analysis of Montgomery Multiplication -- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem -- Modes of Operation -- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data -- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA -- The Security and Performance of the Galois/Counter Mode (GCM) of Operation -- Signatures -- Revisiting Fully Distributed Proxy Signature Schemes -- New ID-Based Threshold Signature Scheme from Bilinear Pairings -- Separable Linkable Threshold Ring Signatures -- Traitor Tracing and Visual Cryptography -- A New Black and White Visual Cryptographic Scheme for General Access Structures -- Identification Algorithms for Sequential Traitor Tracing
- Control code
- 324999335
- Dimensions
- unknown
- Extent
- 1 online resource (xiv, 429 pages)
- Form of item
- online
- Isbn
- 9783540305569
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-24130-0
- Specific material designation
- remote
- System control number
- (OCoLC)324999335
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2004--5th/yiLwffG-VFs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2004--5th/yiLwffG-VFs/">Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2004--5th/yiLwffG-VFs/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Progress-in-cryptology--INDOCRYPT-2004--5th/yiLwffG-VFs/">Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>