Coverart for item
The Resource Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)

Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)

Label
Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings
Title
Progress in cryptology
Title remainder
INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings
Statement of responsibility
Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
Title variation
  • INDOCRYPT 2004
  • 5th International Conference on Cryptology in India
  • Fifth International Conference on Cryptology in India
  • International Conference on Cryptology in India
Creator
Contributor
Subject
Genre
Language
eng
Member of
Cataloging source
GW5XE
Dewey number
005.8
Illustrations
illustrations
Index
index present
LC call number
QA76.9.A25
LC item number
I5535 2004
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2004
http://bibfra.me/vocab/lite/meetingName
International Conference in Cryptology in India
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Canteaut, Anne
  • Viswanathan, Kapaleeswaran
Series statement
Lecture notes in computer science,
Series volume
3348
http://library.link/vocab/subjectName
  • Computer security
  • Cryptography
  • Informatique
  • Computer security
  • Cryptography
  • Cryptographie (Informatique)
Label
Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
Instantiates
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail Scheme -- Multiplicative Homomorphic E-Voting -- Stream Ciphers -- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers -- Algebraic Attacks over GF(q) -- Cryptographic Boolean Functions -- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions -- Generalized Boolean Bent Functions -- On Boolean Functions with Generalized Cryptographic Properties -- Foundations -- Information Theory and the Security of Binary Data Perturbation -- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption -- Block Ciphers -- Faster Variants of the MESH Block Ciphers -- Related-Key Attacks on Reduced Rounds of SHACAL-2 -- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H -- Cryptanalysis of Ake98 -- Public Key Encryption -- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes -- HEAD: Hybrid Encryption with Delegated Decryption Capability -- A Provably Secure Elliptic Curve Scheme with Fast Encryption -- Efficient Representations -- Advances in Alternative Non-adjacent Form Representations -- Public Key Cryptanalysis -- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Exact Analysis of Montgomery Multiplication -- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem -- Modes of Operation -- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data -- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA -- The Security and Performance of the Galois/Counter Mode (GCM) of Operation -- Signatures -- Revisiting Fully Distributed Proxy Signature Schemes -- New ID-Based Threshold Signature Scheme from Bilinear Pairings -- Separable Linkable Threshold Ring Signatures -- Traitor Tracing and Visual Cryptography -- A New Black and White Visual Cryptographic Scheme for General Access Structures -- Identification Algorithms for Sequential Traitor Tracing
Control code
324999335
Dimensions
unknown
Extent
1 online resource (xiv, 429 pages)
Form of item
online
Isbn
9783540305569
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-24130-0
Specific material designation
remote
System control number
(OCoLC)324999335
Label
Progress in cryptology : INDOCRYPT 2004 : 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004 : proceedings, Anne Canteaut, Kapaleeswaran Viswanathan (eds.)
Publication
Bibliography note
Includes bibliographical references and index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
Invited Talks -- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects -- Secure Protocols for Complex Tasks in Complex Environments -- Cryptographic Protocols -- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model -- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations -- Applications -- On the Security of a Certified E-Mail Scheme -- Multiplicative Homomorphic E-Voting -- Stream Ciphers -- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers -- Algebraic Attacks over GF(q) -- Cryptographic Boolean Functions -- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions -- Generalized Boolean Bent Functions -- On Boolean Functions with Generalized Cryptographic Properties -- Foundations -- Information Theory and the Security of Binary Data Perturbation -- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption -- Block Ciphers -- Faster Variants of the MESH Block Ciphers -- Related-Key Attacks on Reduced Rounds of SHACAL-2 -- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H -- Cryptanalysis of Ake98 -- Public Key Encryption -- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes -- HEAD: Hybrid Encryption with Delegated Decryption Capability -- A Provably Secure Elliptic Curve Scheme with Fast Encryption -- Efficient Representations -- Advances in Alternative Non-adjacent Form Representations -- Public Key Cryptanalysis -- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Exact Analysis of Montgomery Multiplication -- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem -- Modes of Operation -- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data -- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA -- The Security and Performance of the Galois/Counter Mode (GCM) of Operation -- Signatures -- Revisiting Fully Distributed Proxy Signature Schemes -- New ID-Based Threshold Signature Scheme from Bilinear Pairings -- Separable Linkable Threshold Ring Signatures -- Traitor Tracing and Visual Cryptography -- A New Black and White Visual Cryptographic Scheme for General Access Structures -- Identification Algorithms for Sequential Traitor Tracing
Control code
324999335
Dimensions
unknown
Extent
1 online resource (xiv, 429 pages)
Form of item
online
Isbn
9783540305569
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other physical details
illustrations.
http://library.link/vocab/ext/overdrive/overdriveId
978-3-540-24130-0
Specific material designation
remote
System control number
(OCoLC)324999335

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...