Progress in Cryptology - INDOCRYPT 2003 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2003.
|
Σειρά: | Lecture Notes in Computer Science,
2904 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talks
- Linear Complexity and Related Complexity Measures for Sequences
- Forensic Computing
- Stream Cipher
- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation
- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator
- Block Cipher
- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA
- Impossible Differential Cryptanalysis for Block Cipher Structures
- Impossible Differential Attack on 30-Round SHACAL-2
- Boolean Function
- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria
- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria
- Secrect Sharing
- On Multiplicative Linear Secret Sharing Schemes
- A New (2,n)-Visual Threshold Scheme for Color Images
- On the Power of Computational Secret Sharing
- Bilinear Pairing
- Identity-Based Broadcasting
- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings
- Extending Joux’s Protocol to Multi Party Key Agreement
- Public Key
- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups
- Prime Numbers of Diffie-Hellman Groups for IKE-MODP
- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems
- Signature Scheme
- Security Analysis of Several Group Signature Schemes
- Forking Lemmas for Ring Signature Schemes
- Protocol
- Practical Mental Poker Without a TTP Based on Homomorphic Encryption
- Lightweight Mobile Credit-Card Payment Protocol
- Elliptic Curve & Algebraic Geometry
- On the Construction of Prime Order Elliptic Curves
- Counting Points on an Abelian Variety over a Finite Field
- Implementation & Digital Watermarking
- Side Channel Attack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication
- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m )
- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes
- Authentication
- More Efficient Password Authenticated Key Exchange Based on RSA
- A Password-Based Authenticator: Security Proof and Applications
- Stronger Security Bounds for OMAC, TMAC, and XCBC
- Progressive Verification: The Case of Message Authentication.