Advances in cryptology ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptol
User Rating: Be the first one!
Author: International Conference on the Theory and Application of Cryptology and Information Security (7th : 2001 : Gold Coast, Qld.), Boyd, Colin
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computer security, Cryptography
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540429875
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 327.84 MB
PDF Size: 5.17 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 699
Views: 749
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 3 540 45682 1 archive t...torrent
Last Modified: 2023-05-26 03:12:28
Download
Size: 16.91 KB
Description
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Author: Colin Boyd
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42987-6
DOI: 10.1007/3-540-45682-1
Table of Contents:
Includes bibliographical references and index
Author: Colin Boyd
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42987-6
DOI: 10.1007/3-540-45682-1
Table of Contents:
- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
- On the Insecurity of a Server-Aided RSA Protocol
- The Modular Inversion Hidden Number Problem
- Secure Human Identification Protocols
- Unbelievable Security Matching AES Security Using Public Key Systems
- A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4
- Computation of Discrete Logarithms in
- Speeding Up XTR
- An Efficient Implementation of Braid Groups
- How to Achieve a McEliece-Based Digital Signature Scheme
- Efficient Traitor Tracing Algorithms Using List Decoding
- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
- Known-IV Attacks on Triple Modes of Operation of Block Ciphers
- Generic Attacks on Feistel Schemes
- A Compact Rijndael Hardware Architecture with S-Box Optimization
- Provable Security of KASUMI and 3GPP Encryption Mode f8
- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
- Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case
- Fully Distributed Threshold RSA under Standard Assumptions
- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts