Progress in Cryptology - INDOCRYPT 2002
Springer Berlin (Verlag)
978-3-540-00263-5 (ISBN)
Invited Talks.- Security of a Wide Trail Design.- Fast Algorithms for Determining the Linear Complexity of Period Sequences.- Symmetric Ciphers.- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures.- Slide Attack on Spectr-H64.- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract).- New Public-Key Schemes.- A Variant of NTRU with Non-invertible Polynomials.- Tree Replacement and Public Key Cryptosystem.- Foundations.- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System.- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement.- Public-Key Infrastructures.- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI).- Towards Logically and Physically Secure Public-Key Infrastructures.- Fingerprinting and Watermarking.- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme.- A 2-Secure Code with Efficient Tracing Algorithm.- Reed Solomon Codes for Digital Fingerprinting.- Public-Key Protocols.- A Note on the Malleability of the El Gamal Cryptosystem.- Authentication of Concast Communication.- Self-certified Signatures.- Identity Based Authenticated Group Key Agreement Protocol.- Boolean Functions.- Construction of Cryptographically Important Boolean Functions.- Evolving Boolean Functions Satisfying Multiple Criteria.- Further Results Related to Generalized Nonlinearity.- Efficient and Secure Implementations.- Modular Multiplication in GF(pk) Using Lagrange Representation.- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map.- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.- Applications.- The Design and Implementation of Improved Secure CookiesBased on Certificate.- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority.- Spending Offline Divisible Coins with Combining Capability.- Efficient Object-Based Stream Authentication.- Anonymity.- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem.- New Identity Escrow Scheme for Anonymity Authentication.- Secret Sharing and Oblivious Transfer.- On Unconditionally Secure Distributed Oblivious Transfer.- Non-perfect Secret Sharing over General Access Structures.- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Erscheint lt. Verlag | 2.12.2002 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 444 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 640 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • algorithms • Architecture • Block Cyphers • boolean function • Communication • Complexity • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Cyrptographic Protocols • data encryption • Digital Signatures • Hardcover, Softcover / Informatik, EDV/Allgemeines, Lexika • HC/Informatik, EDV/Allgemeines, Lexika • HC/Informatik, EDV/Informatik • Public Key Cryptography • Secure Communications • security • Zero-Knowledge Systems |
ISBN-10 | 3-540-00263-4 / 3540002634 |
ISBN-13 | 978-3-540-00263-5 / 9783540002635 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich