Progress in Cryptology -- INDOCRYPT 2003
Springer Berlin (Verlag)
978-3-540-20609-5 (ISBN)
Invited Talks.- Linear Complexity and Related Complexity Measures for Sequences.- Forensic Computing.- Stream Cipher.- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation.- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.- Block Cipher.- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA.- Impossible Differential Cryptanalysis for Block Cipher Structures.- Impossible Differential Attack on 30-Round SHACAL-2.- Boolean Function.- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria.- Secrect Sharing.- On Multiplicative Linear Secret Sharing Schemes.- A New (2,n)-Visual Threshold Scheme for Color Images.- On the Power of Computational Secret Sharing.- Bilinear Pairing.- Identity-Based Broadcasting.- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.- Extending Joux's Protocol to Multi Party Key Agreement.- Public Key.- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Prime Numbers of Diffie-Hellman Groups for IKE-MODP.- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems.- Signature Scheme.- Security Analysis of Several Group Signature Schemes.- Forking Lemmas for Ring Signature Schemes.- Protocol.- Practical Mental Poker Without a TTP Based on Homomorphic Encryption.- Lightweight Mobile Credit-Card Payment Protocol.- Elliptic Curve & Algebraic Geometry.- On the Construction of Prime Order Elliptic Curves.- Counting Points on an Abelian Variety over a Finite Field.- Implementation & Digital Watermarking.- Side ChannelAttack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication.- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ).- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes.- Authentication.- More Efficient Password Authenticated Key Exchange Based on RSA.- A Password-Based Authenticator: Security Proof and Applications.- Stronger Security Bounds for OMAC, TMAC, and XCBC.- Progressive Verification: The Case of Message Authentication.
Erscheint lt. Verlag | 25.11.2003 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 436 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 660 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • boolean function • Computational Number Theory • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Digital Signatures • Finite Field Computations • Information Security • Kryptographie / Kryptologie • privacy • Public Key Cryptography • Secure Communications |
ISBN-10 | 3-540-20609-4 / 3540206094 |
ISBN-13 | 978-3-540-20609-5 / 9783540206095 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich