Progress in Cryptology - INDOCRYPT 2002
Editat de Alfred Menezes, Palash Sarkaren Limba Engleză Paperback – 2 dec 2002
Preț: 329.14 lei
Preț vechi: 411.42 lei
-20% Nou
Puncte Express: 494
Preț estimativ în valută:
58.23€ • 67.84$ • 50.85£
58.23€ • 67.84$ • 50.85£
Carte tipărită la comandă
Livrare economică 19 ianuarie-02 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540002635
ISBN-10: 3540002634
Pagini: 456
Ilustrații: XII, 444 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.69 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540002634
Pagini: 456
Ilustrații: XII, 444 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.69 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Security of a Wide Trail Design.- Fast Algorithms for Determining the Linear Complexity of Period Sequences.- Symmetric Ciphers.- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures.- Slide Attack on Spectr-H64.- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract).- New Public-Key Schemes.- A Variant of NTRU with Non-invertible Polynomials.- Tree Replacement and Public Key Cryptosystem.- Foundations.- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System.- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement.- Public-Key Infrastructures.- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI).- Towards Logically and Physically Secure Public-Key Infrastructures.- Fingerprinting and Watermarking.- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme.- A 2-Secure Code with Efficient Tracing Algorithm.- Reed Solomon Codes for Digital Fingerprinting.- Public-Key Protocols.- A Note on the Malleability of the El Gamal Cryptosystem.- Authentication of Concast Communication.- Self-certified Signatures.- Identity Based Authenticated Group Key Agreement Protocol.- Boolean Functions.- Construction of Cryptographically Important Boolean Functions.- Evolving Boolean Functions Satisfying Multiple Criteria.- Further Results Related to Generalized Nonlinearity.- Efficient and Secure Implementations.- Modular Multiplication in GF(pk) Using Lagrange Representation.- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map.- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.- Applications.- The Design and Implementation of Improved Secure CookiesBased on Certificate.- A Certified E-mail System with Receiver’s Selective Usage of Delivery Authority.- Spending Offline Divisible Coins with Combining Capability.- Efficient Object-Based Stream Authentication.- Anonymity.- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem.- New Identity Escrow Scheme for Anonymity Authentication.- Secret Sharing and Oblivious Transfer.- On Unconditionally Secure Distributed Oblivious Transfer.- Non-perfect Secret Sharing over General Access Structures.- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Caracteristici
Includes supplementary material: sn.pub/extras