Topics in Cryptology - CT-RSA 2002 The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings /

This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of partici...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Preneel, Bart (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
Έκδοση:1st ed. 2002.
Σειρά:Lecture Notes in Computer Science, 2271
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 05693nam a2200613 4500
001 978-3-540-45760-2
003 DE-He213
005 20191027132301.0
007 cr nn 008mamaa
008 121227s2002 gw | s |||| 0|eng d
020 |a 9783540457602  |9 978-3-540-45760-2 
024 7 |a 10.1007/3-540-45760-7  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.D335 
072 7 |a GPJ  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.82  |2 23 
245 1 0 |a Topics in Cryptology - CT-RSA 2002  |h [electronic resource] :  |b The Cryptographer's Track at the RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002, Proceedings /  |c edited by Bart Preneel. 
250 |a 1st ed. 2002. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2002. 
300 |a X, 318 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2271 
505 0 |a Public Key Cryptography -- On Hash Function Firewalls in Signature Schemes -- Observability Analysis - Detecting When Improved Cryptosystems Fail - -- Efficient Hardware Implementations -- Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli -- Montgomery in Practice: How to Do It More Efficiently in Hardware -- MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis -- An ASIC Implementation of the AES SBoxes -- Public Key Cryptography: Theory -- On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function -- The Representation Problem Based on Factoring -- Symmetric Ciphers -- Ciphers with Arbitrary Finite Domains -- Known Plaintext Correlation Attack against RC5 -- E-Commerce and Applications -- Micropayments Revisited -- Proprietary Certificates -- Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption -- Digital Signatures -- RSA-Based Undeniable Signatures for General Moduli -- Co-operatively Formed Group Signatures -- Transitive Signature Schemes -- Homomorphic Signature Schemes -- Public Key Encryption -- GEM: A Generic Chosen-Ciphertext Secure Encryption Method -- Securing "Encryption + Proof of Knowledge" in the Random Oracle Model -- Discrete Logarithm -- Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture -- Secure Key-Evolving Protocols for Discrete Logarithm Schemes. 
520 |a This volume continues the tradition established in 2001 of publishing the c- tributions presented at the Cryptographers' Track (CT-RSA) of the yearly RSA Security Conference in Springer-Verlag's Lecture Notes in Computer Science series. With 14 parallel tracks and many thousands of participants, the RSA - curity Conference is the largest e-security and cryptography conference. In this setting, the Cryptographers' Track presents the latest scienti?c developments. The program committee considered 49 papers and selected 20 for presen- tion. One paper was withdrawn by the authors. The program also included two invited talks by Ron Rivest ("Micropayments Revisited" - joint work with Silvio Micali) and by Victor Shoup ("The Bumpy Road from Cryptographic Theory to Practice"). Each paper was reviewed by at least three program committee members; paperswrittenbyprogramcommitteemembersreceivedsixreviews.Theauthors of accepted papers made a substantial e?ort to take into account the comments intheversionsubmittedtotheseproceedings.Inalimitednumberofcases,these revisions were checked by members of the program committee. I would like to thank the 20 members of the program committee who helped to maintain the rigorous scienti?c standards to which the Cryptographers' Track aims to adhere. They wrote thoughtful reviews and contributed to long disc- sions; more than 400 Kbyte of comments were accumulated. Many of them - tended the program committee meeting, while they could have been enjoying the sunny beaches of Santa Barbara. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computers. 
650 0 |a Operating systems (Computers). 
650 0 |a Computer science-Mathematics. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Algorithms. 
650 1 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Theory of Computation.  |0 http://scigraph.springernature.com/things/product-market-codes/I16005 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Discrete Mathematics in Computer Science.  |0 http://scigraph.springernature.com/things/product-market-codes/I17028 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Algorithm Analysis and Problem Complexity.  |0 http://scigraph.springernature.com/things/product-market-codes/I16021 
700 1 |a Preneel, Bart.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662187319 
776 0 8 |i Printed edition:  |z 9783540432241 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2271 
856 4 0 |u https://doi.org/10.1007/3-540-45760-7  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)