Detail Cantuman
Pencarian SpesifikE Book
Progress in Cryptology - INDOCRYPT 2005
Invited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way Hash Functions of Order r -- Towards Optimal Double-Length Hash Functions -- Design Principles -- Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries -- Design Principles for Combiners with Memory -- Cryptanalysis I -- Cryptanalysis of the Quadratic Generator -- Attack the Dragon -- Two Algebraic Attacks Against the F-FCSRs Using the IV Mode -- Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks -- Time Memory Trade-Off -- TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY -- Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints -- Cryptanalysis II -- Cryptanalysis of Barni et al. Watermarking Scheme -- Completion Attacks and Weak Keys of Oleshchuk’s Public Key Cryptosystem -- New Constructions -- An Optimal Subset Cover for Broadcast Encryption -- MaTRU: A New NTRU-Based Cryptosystem -- Anonymous Password-Based Authenticated Key Exchange -- Pairings -- Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism -- Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme -- Signatures -- Short Undeniable Signatures Without Random Oracles: The Missing Link -- Short Threshold Signature Schemes Without Random Oracles -- Applications -- Attacking an Asynchronous Multi-party Contract Signing Protocol -- Fairness and Correctness in Case of a Premature Abort -- E-Cash -- Short E-Cash -- A Universally Composable Scheme for Electronic Cash -- Implementations -- Energy-Privacy Trade-Offs in VLSI Computations -- Modified Serial Multipliers for Type-IV Gaussian Normal Bases -- Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic -- SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2.
Ketersediaan
Tidak ada salinan data
Informasi Detil
Judul Seri |
-
|
---|---|
No. Panggil |
-
|
Penerbit | Springer : Berlin., 2005 |
Deskripsi Fisik |
XIV, 420 p.online resource.
|
Bahasa |
English
|
ISBN/ISSN |
9783540322788
|
Klasifikasi |
005.82
|
Tipe Isi |
-
|
Tipe Media |
-
|
---|---|
Tipe Pembawa |
-
|
Edisi |
1st ed.
|
Subyek |
Data encryption (Computer science).
Coding theory. Information theory. Algorithms. Computer science—Mathematics. Operating systems (Computers). Computer communication systems. Cryptology. Coding and Information Theory. Algorithm Analysis and Problem Complexity. Discrete Mathematics in Computer Science. Operating Systems. Computer Communication Networks. |
Info Detil Spesifik |
-
|
Pernyataan Tanggungjawab |
Subhamoy Maitra, C.E. Veni Madhavan, Ramarathnam Venkatesan.
|
Informasi Lainnya
Anak judul |
6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings
|
---|---|
Judul asli |
-
|
DOI/URL |
https://doi.org/10.1007/11596219
|
Versi lain/terkait
Tidak tersedia versi lain