Fishpond Gift Vouchers - Let them choose!

Shop over a million Toys in our Huge New Range

Progress in Cryptology - Indocrypt 2004
By

Rating
Product Details

Table of Contents

Invited Talks.- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects.- Secure Protocols for Complex Tasks in Complex Environments.- Cryptographic Protocols.- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations.- Applications.- On the Security of a Certified E-Mail Scheme.- Multiplicative Homomorphic E-Voting.- Stream Ciphers.- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.- Algebraic Attacks over GF(q).- Cryptographic Boolean Functions.- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.- Generalized Boolean Bent Functions.- On Boolean Functions with Generalized Cryptographic Properties.- Foundations.- Information Theory and the Security of Binary Data Perturbation.- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.- Block Ciphers.- Faster Variants of the MESH Block Ciphers.- Related-Key Attacks on Reduced Rounds of SHACAL-2.- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.- Cryptanalysis of Ake98.- Public Key Encryption.- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes.- HEAD: Hybrid Encryption with Delegated Decryption Capability.- A Provably Secure Elliptic Curve Scheme with Fast Encryption.- Efficient Representations.- Advances in Alternative Non-adjacent Form Representations.- Public Key Cryptanalysis.- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Exact Analysis of Montgomery Multiplication.- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem.- Modes of Operation.- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data.- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.- The Security and Performance of the Galois/Counter Mode (GCM) of Operation.- Signatures.- Revisiting Fully Distributed Proxy Signature Schemes.- New ID-Based Threshold Signature Scheme from Bilinear Pairings.- Separable Linkable Threshold Ring Signatures.- Traitor Tracing and Visual Cryptography.- A New Black and White Visual Cryptographic Scheme for General Access Structures.- Identification Algorithms for Sequential Traitor Tracing.

Ask a Question About this Product More...
Write your question below:
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Progress in Cryptology - Indocrypt 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings (Lecture Notes in Computer Science / Lecture Notes in Artificial Intelligence) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Item ships from and is sold by Fishpond.com, Inc.
Back to top