[PDF] Advances in cryptology-ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings - eBookmela

Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings

New Added
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
Likes+254
Telegram icon Share on Telegram

Advances in cryptology ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptol

User Rating: Be the first one!

Author: International Conference on the Theory and Application of Cryptology and Information Security (7th : 2001 : Gold Coast, Qld.), Boyd, Colin

Added by: sketch

Added Date: 2015-12-30

Language: eng

Subjects: Computer security, Cryptography

Publishers: Berlin ; New York : Springer

Collections: journals contributions, journals

ISBN Number: 3540429875

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 327.84 MB

PDF Size: 5.17 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 699

Views: 749

Total Files: 18

Media Type: texts

PDF With Zip
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings

April 12, 2022

Download PDF

5.17 MB 1PDF Files

Zip Big Size
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings

April 12, 2022

Download Zip

327.84 MB 18Files

Total Files: 5

PDF
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
10 1007 3 540 45682 1 pdf

Last Modified: 2015-12-30 07:13:18

Download

Size: 5.17 MB

GZ
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
10 1007 3 540 45682 1 abbyy gz

Last Modified: 2015-12-30 08:49:44

Download

Size: 20.89 MB

TXT
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
10 1007 3 540 45682 1 djvu txt

Last Modified: 2016-01-07 12:15:45

Download

Size: 1.51 MB

ZIP
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
10 1007 3 540 45682 1 jp2 zip

Last Modified: 2015-12-30 07:26:07

Download

Size: 275.79 MB

TORRENT
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
springer 10 1007 3 540 45682 1 archive t...torrent

Last Modified: 2023-05-26 03:12:28

Download

Size: 16.91 KB

Description

Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Author: Colin Boyd
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42987-6
DOI: 10.1007/3-540-45682-1

Table of Contents:

  • Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
  • On the Insecurity of a Server-Aided RSA Protocol
  • The Modular Inversion Hidden Number Problem
  • Secure Human Identification Protocols
  • Unbelievable Security Matching AES Security Using Public Key Systems
  • A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4
  • Computation of Discrete Logarithms in
  • Speeding Up XTR
  • An Efficient Implementation of Braid Groups
  • How to Achieve a McEliece-Based Digital Signature Scheme
  • Efficient Traitor Tracing Algorithms Using List Decoding
  • Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
  • Known-IV Attacks on Triple Modes of Operation of Block Ciphers
  • Generic Attacks on Feistel Schemes
  • A Compact Rijndael Hardware Architecture with S-Box Optimization
  • Provable Security of KASUMI and 3GPP Encryption Mode f8
  • Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
  • Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case
  • Fully Distributed Threshold RSA under Standard Assumptions
  • Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes

Includes bibliographical references and index

You May Also Like

We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account