did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540001713

Advances in Cryptology-Asiacrypt 2002

by
  • ISBN13:

    9783540001713

  • ISBN10:

    3540001719

  • Format: Paperback
  • Copyright: 2002-12-01
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $99.99 Save up to $81.43
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.

Table of Contents

Analysis of Bernstein's Factorization Circuit
1(27)
Arjen K. Lenstra
Adi Shamir
Jim Tomlinson
Eran Tromer
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order
27(19)
Stefan Lucks
Looking beyond XTR
46(18)
Wieb Bosma
James Hutton
Eric R. Verheul
Bounds for Robust Metering Schemes and Their Relationship with A2-code
64(17)
Wakaha Ogata
Kaoru Kurosawa
Unconditionally Secure Anonymous Encryption and Group Authentication
81(19)
Goichiro Hanaoka
Junji Shikata
Yumiko Hanaoka
Hideki Imai
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model
100(10)
Alexander W. Dent
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives
110(15)
Yan-Cheng Chang
Chun-Yun Hsiao
Chi-Jen Lu
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order
125(18)
Ivan Damgard
Eiichiro Fujisaki
Efficient Oblivious Transfer in the Bounded-Storage Model
143(17)
Dowon Hong
Ku-Young Chang
Heuisu Ryu
In How Many Ways Can You Write Rijndael?
160(16)
Elad Barkan
Eli Biham
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis
176(16)
Sangwoo Park
Soo Hak Sung
Seongtaek Chee
E-Joong Yoon
Jongin Lim
Threshold Cryptosystems Based on Factoring
192(14)
Jonathan Katz
Moti Yung
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments
206(18)
Masayuki Abe
Ronald Cramer
Serge Fehr
Asynchronous Secure Communication Tolerating Mixed Adversaries
224(19)
K. Srinathan
M. V.N. Ashwin Kumar
C. Pandu Rangan
Amplified Boomerang Attack against Reduced-Round SHACAL
243(11)
Jongsung Kim
Dukjae Moon
Wonil Lee
Seokhie Hong
Sangjin Lee
Seokwon Jung
Enhancing Differential-Linear Cryptanalysis
254(13)
Eli Biham
Orr Dunkelman
Nathan Keller
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations
267(21)
Nicolas T. Courtois
Josef Pieprzyk
Analysis of Neural Cryptography
288(11)
Alexander Klimov
Anton Mityagin
Adi Shamir
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm
299(12)
Dario Catalano
Phong Q. Nguyen
Jacques Stern
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2
311(17)
Pierrick Gaudry
A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme
328(18)
Hiroki Koga
On Unconditionally Secure Robust Distributed Key Distribution Centers
346(18)
Paolo D'Arco
Douglas R. Stinson
Short Signatures in the Random Oracle Model
364(15)
Louis Granboulan
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes
379(18)
Alejandro Hevia
Daniele Micciancio
Transitive Signatures Based on Factoring and RSA
397(18)
Mihir Bellare
Gregory Neven
1-out-of-n Signatures from a Variety of Keys
415(18)
Masayuki Abe
Miyako Ohkubo
Koutarou Suzuki
A Revocation Scheme with Minimal Storage at Receivers
433(18)
Tomoyuki Asano
Optimistic Mixing for Exit-Polls
451(15)
Philippe Golle
Sheng Zhong
Dan Boneh
Markus Jakobsson
Ari Juels
Improved Construction of Nonlinear Resilient S-Boxes
466(18)
Kishan Chand Gupta
Palash Sarkar
An Upper Bound on the Number of m-Resilient Boolean Functions
484(13)
Claude Carlet
Aline Gouget
Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks
497(18)
Emmanuel Bresson
Olivier Chevassut
David Pointcheval
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization
515(18)
Chanathip Namprempre
ID-Based Blind Signature and Ring Signature from Pairings
533(15)
Fangguo Zhang
Kwangjo Kim
Hierarchical ID-Based Cryptography
548(19)
Craig Gentry
Alice Silverberg
Crypto-integrity
567(7)
Moti Yung
Gummy and Conductive Silicone Rubber Fingers
574(1)
Tsutomu Matsumoto
Author Index 575

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program