New Added

Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings

Likes+636

Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
Original Title Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
Author International Conference on the Theory and Application of Cryptology and Information Security (7th : 2001 : Gold Coast, Qld.), Boyd, Colin
Publication date

Topics Computer security, Cryptography
Publisher Berlin , New York : Springer
Collection folkscanomy_miscellaneous, folkscanomy, additional_collections
Language English
Book Type EBook
Material Type Book
File Type PDF
Downloadable Yes
Support Mobile, Desktop, Tablet
Scan Quality: Best No watermark
PDF Quality: Good
Availability Yes
Price 0.00
Submitted By
Sketch the Cow
Submit Date
Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 ProceedingsAuthor: Colin Boyd Published by Springer Berlin Heidelberg ISBN: 978-3-540-42987-6 DOI: 10.1007/3-540-45682-1Table of Contents:Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
On the Insecurity of a Server-Aided RSA Protocol
The Modular Inversion Hidden Number Problem
Secure Human Identification Protocols
Unbelievable Security Matching AES Security Using Public Key Systems
A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4
Computation of Discrete Logarithms in
Speeding Up XTR
An Efficient Implementation of Braid Groups
How to Achieve a McEliece-Based Digital Signature Scheme
Efficient Traitor Tracing Algorithms Using List Decoding
Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
Known-IV Attacks on Triple Modes of Operation of Block Ciphers
Generic Attacks on Feistel Schemes
A Compact Rijndael Hardware Architecture with S-Box Optimization
Provable Security of KASUMI and 3GPP Encryption Mode f8
Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case
Fully Distributed Threshold RSA under Standard Assumptions
Adaptive Security in the Threshold Setting: From Cryptosystems to Signature SchemesIncludes bibliographical references and index
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory a
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings
Advances in cryptology–ASIACRYPT 2001 : 7th International Conference on the Theory a
We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account