Progress in Cryptology - INDOCRYPT 2003 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Johansson, Thomas (Επιμελητής έκδοσης), Maitra, Subhamoy (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2003.
Σειρά:Lecture Notes in Computer Science, 2904
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks
  • Linear Complexity and Related Complexity Measures for Sequences
  • Forensic Computing
  • Stream Cipher
  • Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation
  • Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
  • Block Cipher
  • Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA
  • Impossible Differential Cryptanalysis for Block Cipher Structures
  • Impossible Differential Attack on 30-Round SHACAL-2
  • Boolean Function
  • Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
  • Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria
  • Secrect Sharing
  • On Multiplicative Linear Secret Sharing Schemes
  • A New (2,n)-Visual Threshold Scheme for Color Images
  • On the Power of Computational Secret Sharing
  • Bilinear Pairing
  • Identity-Based Broadcasting
  • Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings
  • Extending Joux’s Protocol to Multi Party Key Agreement
  • Public Key
  • Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups
  • Prime Numbers of Diffie-Hellman Groups for IKE-MODP
  • Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems
  • Signature Scheme
  • Security Analysis of Several Group Signature Schemes
  • Forking Lemmas for Ring Signature Schemes
  • Protocol
  • Practical Mental Poker Without a TTP Based on Homomorphic Encryption
  • Lightweight Mobile Credit-Card Payment Protocol
  • Elliptic Curve & Algebraic Geometry
  • On the Construction of Prime Order Elliptic Curves
  • Counting Points on an Abelian Variety over a Finite Field
  • Implementation & Digital Watermarking
  • Side Channel Attack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication
  • Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m )
  • Cryptanalysis of Block Based Spatial Domain Watermarking Schemes
  • Authentication
  • More Efficient Password Authenticated Key Exchange Based on RSA
  • A Password-Based Authenticator: Security Proof and Applications
  • Stronger Security Bounds for OMAC, TMAC, and XCBC
  • Progressive Verification: The Case of Message Authentication.