Progress in Cryptology - INDOCRYPT 2002 Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 /

The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a forum for presenting high-quality research.It also marks the coming of age of cryptology research in India. The authors for the submitted papers were spr...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Menezes, Alfred (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt), Sarkar, Palash (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2551
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks
  • Security of a Wide Trail Design
  • Fast Algorithms for Determining the Linear Complexity of Period Sequences
  • Symmetric Ciphers
  • A New Class of Stream Ciphers Combining LFSR and FCSR Architectures
  • Slide Attack on Spectr-H64
  • On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract)
  • New Public-Key Schemes
  • A Variant of NTRU with Non-invertible Polynomials
  • Tree Replacement and Public Key Cryptosystem
  • Foundations
  • Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System
  • Asynchronous Unconditionally Secure Computation: An Efficiency Improvement
  • Public-Key Infrastructures
  • QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)
  • Towards Logically and Physically Secure Public-Key Infrastructures
  • Fingerprinting and Watermarking
  • Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme
  • A 2-Secure Code with Efficient Tracing Algorithm
  • Reed Solomon Codes for Digital Fingerprinting
  • Public-Key Protocols
  • A Note on the Malleability of the El Gamal Cryptosystem
  • Authentication of Concast Communication
  • Self-certified Signatures
  • Identity Based Authenticated Group Key Agreement Protocol
  • Boolean Functions
  • Construction of Cryptographically Important Boolean Functions
  • Evolving Boolean Functions Satisfying Multiple Criteria
  • Further Results Related to Generalized Nonlinearity
  • Efficient and Secure Implementations
  • Modular Multiplication in GF(pk) Using Lagrange Representation
  • Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
  • Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
  • Applications
  • The Design and Implementation of Improved Secure Cookies Based on Certificate
  • A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
  • Spending Offline Divisible Coins with Combining Capability
  • Efficient Object-Based Stream Authentication
  • Anonymity
  • The Security of a Mix-Center Based on a Semantically Secure Cryptosystem
  • New Identity Escrow Scheme for Anonymity Authentication
  • Secret Sharing and Oblivious Transfer
  • On Unconditionally Secure Distributed Oblivious Transfer
  • Non-perfect Secret Sharing over General Access Structures
  • On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.