did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

did-you-know? rent-now

Amazon no longer offers textbook rentals. We do!

We're the #1 textbook rental company. Let us show you why.

9783540002635

Progress in Cryptology: Indocrypt 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : Proceedings

by ;
  • ISBN13:

    9783540002635

  • ISBN10:

    3540002634

  • Format: Paperback
  • Copyright: 2003-07-01
  • Publisher: Springer Verlag
  • Purchase Benefits
List Price: $109.00 Save up to $90.44
  • Digital
    $40.22
    Add to Cart

    DURATION
    PRICE

Supplemental Materials

What is included with this book?

Summary

This book constitutes the refereed proceedings of the Third International Conference on Cryptology in India, INDOCRYPT 2002, held in Hyderabad, India in December 2002.The 31 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 75 submissions. The papers are organized in topical sections on symmetric cyphers, new public-key schemes, foundations, public-key infrastructures, fingerprinting and watermarking, public-key protocols, Boolean functions, efficient and secure implementations, applications, anonymity, and secret sharing and oblivious transfer.

Table of Contents

Security of a Wide Trail Designp. 1
Fast Algorithms for Determining the Linear Complexity of Period Sequencesp. 12
A New Class of Stream Ciphers Combining LFSR and FCSR Architecturesp. 22
Slide Attack on Spectr-H64p. 34
On Differential Properties of Pseudo-Hadamard Transform and Related Mappingsp. 48
A Variant of NTRU with Non-invertible Polynomialsp. 62
Tree Replacement and Public Key Cryptosystemp. 71
Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof Systemp. 79
Asynchronous Unconditionally Secure Computation: An Efficiency Improvementp. 93
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)p. 108
Towards Logically and Physically Secure Public-Key Infrastructuresp. 122
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Schemep. 135
A 2-Secure Code with Efficient Tracing Algorithmp. 149
Reed Solomon Codes for Digital Fingerprintingp. 163
A Note on the Malleability of the El Gamal Cryptosystemp. 176
Authentication of Concast Communicationp. 185
Self-certified Signaturesp. 199
Identity Based Authenticated Group Key Agreement Protocolp. 215
Construction of Cryptographically Important Boolean Functionsp. 234
Evolving Boolean Functions Satisfying Multiple Criteriap. 246
Further Results Related to Generalized Nonlinearityp. 260
Modular Multiplication in GF(p[superscript k]) Using Lagrange Representationp. 275
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Mapp. 285
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacksp. 296
The Design and Implementation of Improved Secure Cookies Based on Certificatep. 314
A Certified E-mail System with Receiver's Selective Usage of Delivery Authorityp. 326
Spending Offline Divisible Coins with Combining Capabilityp. 339
Efficient Object-Based Stream Authenticationp. 354
The Security of a Mix-Center Based on a Semantically Secure Cryptosystemp. 368
New Identity Escrow Scheme for Anonymity Authenticationp. 382
On Unconditionally Secure Distributed Oblivious Transferp. 395
Non-perfect Secret Sharing over General Access Structuresp. 409
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structurep. 422
Author Indexp. 437
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program