Progress in Cryptology - INDOCRYPT 2001
Springer Berlin (Verlag)
9783540430100 (ISBN)
Invited Lecture.- Cryptographic Functions and Design Criteria for Block Ciphers.- Hashing.- Mobile Agent Route Protection through Hash-Based Mechanisms.- A New Anonymous Fingerprinting Scheme with High Enciphering Rate.- A Parallel Algorithm for Extending Cryptographic Hash Functions.- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining.- Algebraic Schemes.- Multiples of Primitive Polynomials over GF(2).- Fast Generation of Cubic Irreducible Polynomials for XTR.- Cheating Prevention in Secret Sharing over GF(p t).- Elliptic Curves.- An Application of Sieve Methods to Elliptic Curves.- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography.- Coding Theory.- Frameproof and IPP Codes.- Linear Authentication Codes: Bounds and Constructions.- Applications -I.- Selective Receipt in Certified E-mail.- Spatial Domain Digital Watermarking with Buyer Authentication.- Efficient Public Auction with One-Time Registration and Public Verifiability.- An Analysis of Integrity Services in Protocols.- Cryptanalysis.- Cryptanalysis of the Nonlinear FeedForward Generator.- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree.- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.- Distributed Cryptography.- Robust and Secure Broadcasting.- Toward Optimal Player Weights in Secure Distributed Protocols.- Boolean Functions.- Autocorrelation Properties of Correlation Immune Boolean Functions.- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices.- Digital Signatures.- A Twin Algorithm for Efficient Generation of Digital Signatures.- Efficient "on the Fly" Signature Schemes Based on Integer Factoring.- Shift Registers.- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator.- Efficient Software Implementation of Linear Feedback Shift Registers.- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001.- Applications -II.- Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography.- Re-dividing Complexity between Algorithms and Keys.- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function.
| Erscheint lt. Verlag | 5.12.2001 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XIV, 358 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 561 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • algorithms • coding theory • Complexity • Computational Algebraic Number Theory • Cryptoanalyse • Cryptographics Functions • cryptography • Cryptology • Cryptosysteme • data encryption • Digital Auctions • Digital Payment • Digital Signatures • Email • finite field • Information Security • Online • Public Key Cryptography |
| ISBN-13 | 9783540430100 / 9783540430100 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich