Progress in Cryptology -- INDOCRYPT 2003 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings /

Progress in Cryptology -- INDOCRYPT 2003 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings / [electronic resource] : edited by Thomas Johansson, Subhamoy Maitra. - 1st ed. 2003. - XII, 436 p. online resource. - Lecture Notes in Computer Science, 2904 1611-3349 ; . - Lecture Notes in Computer Science, 2904 .

Invited Talks -- Linear Complexity and Related Complexity Measures for Sequences -- Forensic Computing -- Stream Cipher -- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation -- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator -- Block Cipher -- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA -- Impossible Differential Cryptanalysis for Block Cipher Structures -- Impossible Differential Attack on 30-Round SHACAL-2 -- Boolean Function -- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria -- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria -- Secrect Sharing -- On Multiplicative Linear Secret Sharing Schemes -- A New (2,n)-Visual Threshold Scheme for Color Images -- On the Power of Computational Secret Sharing -- Bilinear Pairing -- Identity-Based Broadcasting -- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings -- Extending Joux’s Protocol to Multi Party Key Agreement -- Public Key -- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Prime Numbers of Diffie-Hellman Groups for IKE-MODP -- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems -- Signature Scheme -- Security Analysis of Several Group Signature Schemes -- Forking Lemmas for Ring Signature Schemes -- Protocol -- Practical Mental Poker Without a TTP Based on Homomorphic Encryption -- Lightweight Mobile Credit-Card Payment Protocol -- Elliptic Curve & Algebraic Geometry -- On the Construction of Prime Order Elliptic Curves -- Counting Points on an Abelian Variety over a Finite Field -- Implementation & Digital Watermarking -- Side ChannelAttack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication -- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ) -- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes -- Authentication -- More Efficient Password Authenticated Key Exchange Based on RSA -- A Password-Based Authenticator: Security Proof and Applications -- Stronger Security Bounds for OMAC, TMAC, and XCBC -- Progressive Verification: The Case of Message Authentication.

9783540245827

10.1007/b94593 doi


Cryptography.
Data encryption (Computer science).
Coding theory.
Information theory.
Computer networks .
Operating systems (Computers).
Algorithms.
Computer science--Mathematics.
Discrete mathematics.
Cryptology.
Coding and Information Theory.
Computer Communication Networks.
Operating Systems.
Algorithms.
Discrete Mathematics in Computer Science.

QA268

005.824
© 2024 IIIT-Delhi, library@iiitd.ac.in