HOME > 상세정보

상세정보

Progress in cryptology--INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings

Progress in cryptology--INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings

자료유형
단행본
개인저자
Menezes, A. J. (Alfred J.), 1965-. Sarkar, Palash, 1969-.
서명 / 저자사항
Progress in cryptology--INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings / Alfred Menezes, Palash Sarkar (eds.).
발행사항
Berlin ;   New York :   Springer,   c2002.  
형태사항
xi, 435 p. : ill. ; 23 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2551
ISBN
3540002634 (pbk. : alk. paper) 9783540002635 (pbk. : alk. paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01555camuu2200373 a 4500
001 000045561613
005 20091125162336
008 021108s2002 gw a b 101 0 eng
010 ▼a 2002042654
020 ▼a 3540002634 (pbk. : alk. paper)
020 ▼a 9783540002635 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm51046796
035 ▼a (OCoLC)51046796
035 ▼a (KERIS)REF000006906312
040 ▼a DLC ▼c DLC ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I5535 2002
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I612p ▼c 3
111 2 ▼a International Conference in Cryptology in India ▼n (3rd : ▼d 2002 : ▼c Hyderabad, India)
245 1 0 ▼a Progress in cryptology--INDOCRYPT 2002 : ▼b Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings / ▼c Alfred Menezes, Palash Sarkar (eds.).
246 3 0 ▼a INDOCRYPT 2002
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2002.
300 ▼a xi, 435 p. : ▼b ill. ; ▼c 23 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2551
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Menezes, A. J. ▼q (Alfred J.), ▼d 1965-.
700 1 ▼a Sarkar, Palash, ▼d 1969-.
830 0 ▼a Lecture notes in computer science ; ▼v 2551.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I612p 3 등록번호 121186944 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Invited Talks.- Security of a Wide Trail Design.- Fast Algorithms for Determining the Linear Complexity of Period Sequences.- Symmetric Ciphers.- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures.- Slide Attack on Spectr-H64.- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract).- New Public-Key Schemes.- A Variant of NTRU with Non-invertible Polynomials.- Tree Replacement and Public Key Cryptosystem.- Foundations.- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System.- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement.- Public-Key Infrastructures.- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI).- Towards Logically and Physically Secure Public-Key Infrastructures.- Fingerprinting and Watermarking.- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme.- A 2-Secure Code with Efficient Tracing Algorithm.- Reed Solomon Codes for Digital Fingerprinting.- Public-Key Protocols.- A Note on the Malleability of the El Gamal Cryptosystem.- Authentication of Concast Communication.- Self-certified Signatures.- Identity Based Authenticated Group Key Agreement Protocol.- Boolean Functions.- Construction of Cryptographically Important Boolean Functions.- Evolving Boolean Functions Satisfying Multiple Criteria.- Further Results Related to Generalized Nonlinearity.- Efficient and Secure Implementations.- Modular Multiplication in GF(pk) Using Lagrange Representation.- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map.- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.- Applications.- The Design and Implementation of Improved Secure Cookies Based on Certificate.- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority.- Spending Offline Divisible Coins with Combining Capability.- Efficient Object-Based Stream Authentication.- Anonymity.- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem.- New Identity Escrow Scheme for Anonymity Authentication.- Secret Sharing and Oblivious Transfer.- On Unconditionally Secure Distributed Oblivious Transfer.- Non-perfect Secret Sharing over General Access Structures.- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.


정보제공 : Aladin

관련분야 신착자료