Progress in Cryptology - INDOCRYPT 2001
Springer Berlin (Verlag)
978-3-540-43010-0 (ISBN)
Invited Lecture.- Cryptographic Functions and Design Criteria for Block Ciphers.- Hashing.- Mobile Agent Route Protection through Hash-Based Mechanisms.- A New Anonymous Fingerprinting Scheme with High Enciphering Rate.- A Parallel Algorithm for Extending Cryptographic Hash Functions.- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining.- Algebraic Schemes.- Multiples of Primitive Polynomials over GF(2).- Fast Generation of Cubic Irreducible Polynomials for XTR.- Cheating Prevention in Secret Sharing over GF(p t).- Elliptic Curves.- An Application of Sieve Methods to Elliptic Curves.- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography.- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography.- Coding Theory.- Frameproof and IPP Codes.- Linear Authentication Codes: Bounds and Constructions.- Applications -I.- Selective Receipt in Certified E-mail.- Spatial Domain Digital Watermarking with Buyer Authentication.- Efficient Public Auction with One-Time Registration and Public Verifiability.- An Analysis of Integrity Services in Protocols.- Cryptanalysis.- Cryptanalysis of the Nonlinear FeedForward Generator.- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree.- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem.- Distributed Cryptography.- Robust and Secure Broadcasting.- Toward Optimal Player Weights in Secure Distributed Protocols.- Boolean Functions.- Autocorrelation Properties of Correlation Immune Boolean Functions.- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices.- Digital Signatures.- A Twin Algorithm for Efficient Generation of Digital Signatures.- Efficient "on the Fly" Signature Schemes Based on Integer Factoring.- Shift Registers.- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator.- Efficient Software Implementation of Linear Feedback Shift Registers.- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001.- Applications -II.- Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography.- Re-dividing Complexity between Algorithms and Keys.- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function.
Erscheint lt. Verlag | 5.12.2001 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 358 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 561 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • algorithms • coding theory • Complexity • Computational Algebraic Number Theory • Cryptoanalyse • Cryptographics Functions • cryptography • Cryptology • Cryptosysteme • data encryption • Digital Auctions • Digital Payment • Digital Signatures • Email • finite field • Information Security • Online • Public Key Cryptography |
ISBN-10 | 3-540-43010-5 / 3540430105 |
ISBN-13 | 978-3-540-43010-0 / 9783540430100 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich