HOME > 상세정보

상세정보

Progress in cryptology--INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings

Progress in cryptology--INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings

자료유형
단행본
개인저자
Pandu Rangan, C., 1955-. Ding, C. (Cunsheng), 1962-.
서명 / 저자사항
Progress in cryptology--INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings / C. Pandu Rangan, Cunsheng Ding (eds.).
발행사항
Berlin :   Springer,   c2001.  
형태사항
xiii, 349 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 2247
ISBN
3540430105 (pbk. : alk. paper) 9783540430100 (pbk. : alk. paper)
일반주기
Also available via the World Wide Web.
서지주기
Includes bibliographical references.
이용가능한 다른형태자료
Also available via the World Wide Web.  
일반주제명
Computer security -- Congresses. Cryptography -- Congresses.
000 01798camuu2200421 a 4500
001 000045561614
005 20091125162057
008 020507s2001 gw a b 101 0 eng c
010 ▼a 2002280796
015 ▼a GBA2-05134
016 7 ▼a 963084623 ▼2 GyFmDB
020 ▼a 3540430105 (pbk. : alk. paper)
020 ▼a 9783540430100 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm48663017
035 ▼a (OCoLC)48663017
035 ▼a (KERIS)REF000006727731
040 ▼a OHX ▼c OHX ▼d ORU ▼d C$Q ▼d UKM ▼d DLC ▼d 211009
042 ▼a pcc
050 0 0 ▼a QA76.9.A25 ▼b I5535 2001
082 0 4 ▼a 005.8/2 ▼2 22
090 ▼a 005.82 ▼b I612p ▼c 2
111 2 ▼a International Conference in Cryptology in India ▼n (2nd : ▼d 2001 : ▼c Madras, India)
245 1 0 ▼a Progress in cryptology--INDOCRYPT 2001 : ▼b Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings / ▼c C. Pandu Rangan, Cunsheng Ding (eds.).
246 3 0 ▼a INDOCRYPT 2001
260 ▼a Berlin : ▼b Springer, ▼c c2001.
300 ▼a xiii, 349 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 2247
504 ▼a Includes bibliographical references.
530 ▼a Also available via the World Wide Web.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Pandu Rangan, C., ▼d 1955-.
700 1 ▼a Ding, C. ▼q (Cunsheng), ▼d 1962-.
830 0 ▼a Lecture notes in computer science ; ▼v 2247.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I612p 2 등록번호 121186943 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Invited Lecture.- Cryptographic Functions and Design Criteria for Block Ciphers.- Hashing.- Mobile Agent Route Protection through Hash-Based Mechanisms.- A New Anonymous Fingerprinting Scheme with High Enciphering Rate.- A Parallel Algorithm for Extending Cryptographic Hash Functions.- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining.- Algebraic Schemes.- Multiples of Primitive Polynomials over GF(2).- Fast Generation of Cubic Irreducible Polynomials for XTR.- Cheating Prevention in Secret Sharing over GF(p t).- Elliptic Curves.- An Application of Sieve Methods to Elliptic Curves.- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography.- Coding Theory.- Frameproof and IPP Codes.- Linear Authentication Codes: Bounds and Constructions.- Applications -I.- Selective Receipt in Certified E-mail.- Spatial Domain Digital Watermarking with Buyer Authentication.- Efficient Public Auction with One-Time Registration and Public Verifiability.- An Analysis of Integrity Services in Protocols.- Cryptanalysis.- Cryptanalysis of the Nonlinear FeedForward Generator.- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree.- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.- Distributed Cryptography.- Robust and Secure Broadcasting.- Toward Optimal Player Weights in Secure Distributed Protocols.- Boolean Functions.- Autocorrelation Properties of Correlation Immune Boolean Functions.- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices.- Digital Signatures.- A Twin Algorithm for Efficient Generation of Digital Signatures.- Efficient "on the Fly" Signature Schemes Based on Integer Factoring.- Shift Registers.- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator.- Efficient Software Implementation of Linear Feedback Shift Registers.- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001.- Applications -II.- Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography.- Re-dividing Complexity between Algorithms and Keys.- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function.


정보제공 : Aladin

관련분야 신착자료