Amazon cover image
Image from Amazon.com

Progress in Cryptology -- INDOCRYPT 2003 [electronic resource] : 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings /

Contributor(s): Material type: TextTextSeries: Lecture Notes in Computer Science ; 2904Publisher: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003Edition: 1st ed. 2003Description: XII, 436 p. online resourceContent type:
  • text
Media type:
  • computer
Carrier type:
  • online resource
ISBN:
  • 9783540245827
Subject(s): Additional physical formats: Printed edition:: No title; Printed edition:: No titleDDC classification:
  • 005.824 23
LOC classification:
  • QA268
Online resources:
Contents:
Invited Talks -- Linear Complexity and Related Complexity Measures for Sequences -- Forensic Computing -- Stream Cipher -- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation -- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator -- Block Cipher -- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA -- Impossible Differential Cryptanalysis for Block Cipher Structures -- Impossible Differential Attack on 30-Round SHACAL-2 -- Boolean Function -- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria -- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria -- Secrect Sharing -- On Multiplicative Linear Secret Sharing Schemes -- A New (2,n)-Visual Threshold Scheme for Color Images -- On the Power of Computational Secret Sharing -- Bilinear Pairing -- Identity-Based Broadcasting -- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings -- Extending Joux’s Protocol to Multi Party Key Agreement -- Public Key -- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Prime Numbers of Diffie-Hellman Groups for IKE-MODP -- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems -- Signature Scheme -- Security Analysis of Several Group Signature Schemes -- Forking Lemmas for Ring Signature Schemes -- Protocol -- Practical Mental Poker Without a TTP Based on Homomorphic Encryption -- Lightweight Mobile Credit-Card Payment Protocol -- Elliptic Curve & Algebraic Geometry -- On the Construction of Prime Order Elliptic Curves -- Counting Points on an Abelian Variety over a Finite Field -- Implementation & Digital Watermarking -- Side ChannelAttack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication -- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ) -- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes -- Authentication -- More Efficient Password Authenticated Key Exchange Based on RSA -- A Password-Based Authenticator: Security Proof and Applications -- Stronger Security Bounds for OMAC, TMAC, and XCBC -- Progressive Verification: The Case of Message Authentication.
In: Springer Nature eBook
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
No physical items for this record

Invited Talks -- Linear Complexity and Related Complexity Measures for Sequences -- Forensic Computing -- Stream Cipher -- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation -- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator -- Block Cipher -- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA -- Impossible Differential Cryptanalysis for Block Cipher Structures -- Impossible Differential Attack on 30-Round SHACAL-2 -- Boolean Function -- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria -- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria -- Secrect Sharing -- On Multiplicative Linear Secret Sharing Schemes -- A New (2,n)-Visual Threshold Scheme for Color Images -- On the Power of Computational Secret Sharing -- Bilinear Pairing -- Identity-Based Broadcasting -- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings -- Extending Joux’s Protocol to Multi Party Key Agreement -- Public Key -- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Prime Numbers of Diffie-Hellman Groups for IKE-MODP -- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems -- Signature Scheme -- Security Analysis of Several Group Signature Schemes -- Forking Lemmas for Ring Signature Schemes -- Protocol -- Practical Mental Poker Without a TTP Based on Homomorphic Encryption -- Lightweight Mobile Credit-Card Payment Protocol -- Elliptic Curve & Algebraic Geometry -- On the Construction of Prime Order Elliptic Curves -- Counting Points on an Abelian Variety over a Finite Field -- Implementation & Digital Watermarking -- Side ChannelAttack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication -- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ) -- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes -- Authentication -- More Efficient Password Authenticated Key Exchange Based on RSA -- A Password-Based Authenticator: Security Proof and Applications -- Stronger Security Bounds for OMAC, TMAC, and XCBC -- Progressive Verification: The Case of Message Authentication.

There are no comments on this title.

to post a comment.
© 2024 IIIT-Delhi, library@iiitd.ac.in