Document - eBookmela
Loading...

Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Crypto | International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea), Lee, Pil Joong

Likes0
Telegram icon Share on Telegram

Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Crypto

User Rating: Be the first one!

Author: International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea), Lee, Pil Joong

Added by: sketch

Added Date: 2015-12-29

Publication Date: 2004

Language: eng

Subjects: Computer security, Cryptography, Sécurité informatique, Cryptographie, Cryptographie (Informatique), Cryptography, Cryptographie (Informatique), Sécurité informatique

Publishers: Berlin : Springer

Collections: journals contributions, journals

ISBN Number: 3540239758, 9783540239758

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 291.39 MB

PDF Size: 4.96 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 471

Views: 521

Total Files: 18

Media Type: texts

Description

Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings
Author: Pil Joong Lee
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23975-8
DOI: 10.1007/b104116

Table of Contents:

  • On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
  • Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
  • Eliminating Random Permutation Oracles in the Even-Mansour Cipher
  • Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
  • OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
  • Stream Ciphers: Dead or Alive?
  • On the Generalized Linear Equivalence of Functions Over Finite Fields
  • Sieving Using Bucket Sort
  • Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups
  • Practical Two-Party Computation Based on the Conditional Gate
  • Privacy in Non-private Environments
  • Asynchronous Proactive Cryptosystems Without Agreement
  • Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
  • Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
  • Higher Order Universal One-Way Hash Functions
  • The MD2 Hash Function Is Not One-Way
  • New Approaches to Password Authenticated Key Exchange Based on RSA
  • Constant-Round Authenticated Group Key Exchange for Dynamic Groups
  • A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
  • Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices

Includes bibliographical references and index
eBookmela
Logo
Register New Account