Document - eBookmela
Loading...

Advances in cryptology ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptol | International Conference on the Theory and Application of Cryptology and Information Security (7th : 2001 : Gold Coast, Qld.), Boyd, Colin

Likes0
Telegram icon Share on Telegram

Advances in cryptology ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptol

User Rating: Be the first one!

Author: International Conference on the Theory and Application of Cryptology and Information Security (7th : 2001 : Gold Coast, Qld.), Boyd, Colin

Added by: sketch

Added Date: 2015-12-30

Publication Date: 2001

Language: eng

Subjects: Computer security, Cryptography

Publishers: Berlin ; New York : Springer

Collections: journals contributions, journals

ISBN Number: 3540429875

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 327.84 MB

PDF Size: 5.17 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 701

Views: 751

Total Files: 18

Media Type: texts

Description

Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001 Proceedings
Author: Colin Boyd
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42987-6
DOI: 10.1007/3-540-45682-1

Table of Contents:

  • Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
  • On the Insecurity of a Server-Aided RSA Protocol
  • The Modular Inversion Hidden Number Problem
  • Secure Human Identification Protocols
  • Unbelievable Security Matching AES Security Using Public Key Systems
  • A Probable Prime Test with Very High Confidence for n ≡ 1 mod 4
  • Computation of Discrete Logarithms in
  • Speeding Up XTR
  • An Efficient Implementation of Braid Groups
  • How to Achieve a McEliece-Based Digital Signature Scheme
  • Efficient Traitor Tracing Algorithms Using List Decoding
  • Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
  • Known-IV Attacks on Triple Modes of Operation of Block Ciphers
  • Generic Attacks on Feistel Schemes
  • A Compact Rijndael Hardware Architecture with S-Box Optimization
  • Provable Security of KASUMI and 3GPP Encryption Mode f8
  • Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
  • Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case
  • Fully Distributed Threshold RSA under Standard Assumptions
  • Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes

Includes bibliographical references and index
eBookmela
Logo
Register New Account