Progress in Cryptology - INDOCRYPT 2002 Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 /
The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a forum for presenting high-quality research.It also marks the coming of age of cryptology research in India. The authors for the submitted papers were spr...
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2002.
|
Edition: | 1st ed. 2002. |
Series: | Lecture Notes in Computer Science,
2551 |
Subjects: | |
Online Access: | Full Text via HEAL-Link |
Table of Contents:
- Invited Talks
- Security of a Wide Trail Design
- Fast Algorithms for Determining the Linear Complexity of Period Sequences
- Symmetric Ciphers
- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures
- Slide Attack on Spectr-H64
- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract)
- New Public-Key Schemes
- A Variant of NTRU with Non-invertible Polynomials
- Tree Replacement and Public Key Cryptosystem
- Foundations
- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System
- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement
- Public-Key Infrastructures
- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)
- Towards Logically and Physically Secure Public-Key Infrastructures
- Fingerprinting and Watermarking
- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme
- A 2-Secure Code with Efficient Tracing Algorithm
- Reed Solomon Codes for Digital Fingerprinting
- Public-Key Protocols
- A Note on the Malleability of the El Gamal Cryptosystem
- Authentication of Concast Communication
- Self-certified Signatures
- Identity Based Authenticated Group Key Agreement Protocol
- Boolean Functions
- Construction of Cryptographically Important Boolean Functions
- Evolving Boolean Functions Satisfying Multiple Criteria
- Further Results Related to Generalized Nonlinearity
- Efficient and Secure Implementations
- Modular Multiplication in GF(pk) Using Lagrange Representation
- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
- Applications
- The Design and Implementation of Improved Secure Cookies Based on Certificate
- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
- Spending Offline Divisible Coins with Combining Capability
- Efficient Object-Based Stream Authentication
- Anonymity
- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem
- New Identity Escrow Scheme for Anonymity Authentication
- Secret Sharing and Oblivious Transfer
- On Unconditionally Secure Distributed Oblivious Transfer
- Non-perfect Secret Sharing over General Access Structures
- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.