HOME > Detail View

Detail View

Progress in cryptology--INDOCRYPT 2005 : 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005 : proceedings

Progress in cryptology--INDOCRYPT 2005 : 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005 : proceedings

Material type
단행본
Personal Author
Maitra, Subhamoy, 1970-. Madhavan, C. E. Veni. Venkatesan, Ramarathnam.
Title Statement
Progress in cryptology--INDOCRYPT 2005 : 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005 : proceedings / Subhamoy Maitra, C. E.Veni Madhavan, Ramarathnam Venkatesan (eds.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2005.  
Physical Medium
xiv, 416 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 3797
ISBN
3540308059 (pbk. : alk. paper) 9783540308058 (pbk. : alk. paper)
General Note
Also issued online.
Bibliography, Etc. Note
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
Subject Added Entry-Topical Term
Computer security -- Congresses. Cryptography -- Congresses.
000 01933camuu22004457a 4500
001 000045561481
005 20091124181611
008 051104s2005 gw a b 101 0 eng d
010 ▼a 2005936804
020 ▼a 3540308059 (pbk. : alk. paper)
020 ▼a 9783540308058 (pbk. : alk. paper)
024 3 ▼a 9783540308058953
035 ▼a (OCoLC)ocm62729529
035 ▼a (OCoLC)62729529
035 ▼a (CStRLIN)NJRGA2590189-B
035 ▼a (KERIS)REF000013003194
040 ▼a LWU ▼c LWU ▼d CUS ▼d VRC ▼d C$Q ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA76.9.A25 ▼b I5535 2005
082 0 0 ▼a 005.8 ▼2 22
082 0 4 ▼a 005.8/2 s ▼2 22
090 ▼a 005.82 ▼b I612p ▼c 6
111 2 ▼a International Conference in Cryptology in India ▼n (6th : ▼d 2005 : ▼c Bangalore, India)
245 1 0 ▼a Progress in cryptology--INDOCRYPT 2005 : ▼b 6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005 : proceedings / ▼c Subhamoy Maitra, C. E.Veni Madhavan, Ramarathnam Venkatesan (eds.).
246 3 0 ▼a INDOCRYPT 2005
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xiv, 416 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3797
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Maitra, Subhamoy, ▼d 1970-.
700 1 ▼a Madhavan, C. E. Veni.
700 1 ▼a Venkatesan, Ramarathnam.
830 0 ▼a Lecture notes in computer science ; ▼v 3797.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 I612p 6 Accession No. 121186716 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Invited Talk.- Abelian Varieties and Cryptography.- Sequences.- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences.- Period of Streamcipher Edon80.- Boolean Function and S-Box.- On the Algebraic Immunity of Symmetric Boolean Functions.- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks.- Hash Functions.- How to Construct Universal One-Way Hash Functions of Order r.- Towards Optimal Double-Length Hash Functions.- Design Principles.- Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries.- Design Principles for Combiners with Memory.- Cryptanalysis I.- Cryptanalysis of the Quadratic Generator.- Attack the Dragon.- Two Algebraic Attacks Against the F-FCSRs Using the IV Mode.- Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks.- Time Memory Trade-Off.- TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY.- Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints.- Cryptanalysis II.- Cryptanalysis of Barni et al. Watermarking Scheme.- Completion Attacks and Weak Keys of Oleshchuk's Public Key Cryptosystem.- New Constructions.- An Optimal Subset Cover for Broadcast Encryption.- MaTRU: A New NTRU-Based Cryptosystem.- Anonymous Password-Based Authenticated Key Exchange.- Pairings.- Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism.- Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme.- Signatures.- Short Undeniable Signatures Without Random Oracles: The Missing Link.- Short Threshold Signature Schemes Without Random Oracles.- Applications.- Attacking an Asynchronous Multi-party Contract Signing Protocol.- Fairness and Correctness in Case of a Premature Abort.- E-Cash.- Short E-Cash.- A Universally Composable Scheme for Electronic Cash.- Implementations.- Energy-Privacy Trade-Offs in VLSI Computations.- Modified Serial Multipliers for Type-IV Gaussian Normal Bases.- Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic.- SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2.


Information Provided By: : Aladin

New Arrivals Books in Related Fields

Zumstein, Felix (2022)