My Account Log in

1 option

Progress in Cryptology - INDOCRYPT 2002 : Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002 / edited by Alfred Menezes, Palash Sarkar.

LIBRA Q341 .P7 2004
Loading location information...

Available from offsite location This item is stored in our repository but can be checked out.

Log in to request item
Format:
Book
Contributor:
Menezes, A. J. (Alfred J.), 1965- editor.
Sarkar, Palash, 1969- editor.
SpringerLink (Online service)
Series:
Computer Science (Springer-11645)
Lecture notes in computer science 0302-9743 ; 2551.
Lecture Notes in Computer Science, 0302-9743 ; 2551
Language:
English
Subjects (All):
Data encryption (Computer science).
Computer science.
Operating systems (Computers).
Algorithms.
Computer science--Mathematics.
Management information systems.
Cryptology.
Computer Science, general.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
Local Subjects:
Cryptology.
Computer Science, general.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Discrete Mathematics in Computer Science.
Management of Computing and Information Systems.
Physical Description:
1 online resource (XII, 444 pages).
Edition:
First edition 2002.
Contained In:
Springer eBooks
Place of Publication:
Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2002.
System Details:
text file PDF
Summary:
The third successful completion of the INDOCRYPT conference series marks the acceptance of the series by the international research community as a forum for presenting high-quality research.It also marks the coming of age of cryptology research in India. The authors for the submitted papers were spread across 21 countries and 4 continents, which goes a long way to demonstrate the international interest and visibility of INDOCRYPT.In the previous two conferences, the submissions from India originated from only two institutes; this increased to six for the 2002 conference.Thus INDOCRYPT is well set on the path to achieving two main ob jectives - to provide an international platform for presenting high-quality research and to stimulate cryptology research in India. The opportunity to serve as a program co-chair for the third INDOCRYPT carries a special satisfaction for the second editor.Way back in 1998, the sci- ti?c analysis group of DRDO organized a National Seminar on Cryptology and abbreviated it as NSCR.On attending the seminar, the second editor suggested that the conference name be changed to INDOCRYPT.It is nice to see that this suggestion was taken up, giving us the annual INDOCRYPT conference - ries.Of course, the form, character, and execution of the conference series was the combined e?ort of the entire Indian cryptographic community under the dynamic leadership of Bimal Roy.
Contents:
Invited Talks
Security of a Wide Trail Design
Fast Algorithms for Determining the Linear Complexity of Period Sequences
Symmetric Ciphers
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures
Slide Attack on Spectr-H64
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract)
New Public-Key Schemes
A Variant of NTRU with Non-invertible Polynomials
Tree Replacement and Public Key Cryptosystem
Foundations
Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement
Public-Key Infrastructures
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)
Towards Logically and Physically Secure Public-Key Infrastructures
Fingerprinting and Watermarking
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme
A 2-Secure Code with Efficient Tracing Algorithm
Reed Solomon Codes for Digital Fingerprinting
Public-Key Protocols
A Note on the Malleability of the El Gamal Cryptosystem
Authentication of Concast Communication
Self-certified Signatures
Identity Based Authenticated Group Key Agreement Protocol
Boolean Functions
Construction of Cryptographically Important Boolean Functions
Evolving Boolean Functions Satisfying Multiple Criteria
Further Results Related to Generalized Nonlinearity
Efficient and Secure Implementations
Modular Multiplication in GF(pk) Using Lagrange Representation
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks
Applications
The Design and Implementation of Improved Secure Cookies Based on Certificate
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority
Spending Offline Divisible Coins with Combining Capability
Efficient Object-Based Stream Authentication
Anonymity
The Security of a Mix-Center Based on a Semantically Secure Cryptosystem
New Identity Escrow Scheme for Anonymity Authentication
Secret Sharing and Oblivious Transfer
On Unconditionally Secure Distributed Oblivious Transfer
Non-perfect Secret Sharing over General Access Structures
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Other Format:
Printed edition:
ISBN:
978-3-540-36231-9
9783540362319
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account