Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008915490/catalog> ?p ?o. }
Showing items 1 to 33 of
33
with 100 items per page.
- catalog alternative "INDOCRYPT 2001".
- catalog contributor b12518768.
- catalog contributor b12518769.
- catalog contributor b12518770.
- catalog created "c2001.".
- catalog date "2001".
- catalog date "c2001.".
- catalog dateCopyrighted "c2001.".
- catalog description "A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet, J.-J. Quisquater and F. Sica -- Frameproof and IPP Codes / P. Sarkar and D. R. Stinson -- Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini, H. Wang and C. Xing -- Selective Receipt in Certified E-Mail / S. Kremer and O. Markowitch -- Spatial Domain Digital Watermaking with Buyer Authentication / S. Maitra and D. P. Mukherjee -- Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee, K. Kim and J. Ma -- An Analysis of Integrity Services in Protocols / K. Viswanathan, C. Boyd and E. Dawson -- Cryptanalysis of the Nonlinear FeedForward Generator / S. S. Bedi and N. R. Pillai -- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer, A. Menezes and E. Teske -- ".
- catalog description "Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef and G. Gong -- Robust and Secure Broadcasting / Y. Mu and V. Varadharajan -- Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan, C. P. Rangan and V. Kamakoti -- Autocorrelation Properties of Correlation Immune Boolean Functions / S. Maitra -- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova and Y. Tarannikov -- A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh -- Efficient "on the Fly" Signature Schemes Based on Integer Factoring / T. Okamoto, M. Tada and A. Miyaji -- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha -- Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury and S. Maitra -- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim, S. Kim and I. Yie / [et al.] -- ".
- catalog description "Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut -- Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer -- A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi and H. Tanaka -- A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar and P. J. Schellenberg -- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining / B.-M. Goi, M. U. Siddiqi and H.-T. Chuah -- Multiples of Primitive Polynomials over GF(2) / K. C. Gupta and S. Maitra -- Fast Generation of Cubic Irreducible Polynomials for XTR / J. M. Kim, I. Yie and S. I. Oh / [et al.] -- Cheating Prevention in Secret Sharing over GF(p[superscript t]) / J. Pieprzyk and X.-M. Zhang -- An Application of Sieve Methods to Elliptic Curves / S. A. Miri and V. K. Murty -- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun, M. Xuanqin and C. Yuanlong -- Re-dividing Complexity between Algorithms and Keys (Key Scripts) / G. Samid -- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz.".
- catalog extent "xiii, 349 p. :".
- catalog identifier "3540430105 (pbk.)".
- catalog isPartOf "Lecture notes in computer science, 0302-9743 ; 2247".
- catalog issued "2001".
- catalog issued "c2001.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.82 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "QA76.9.A25 I5535 2001".
- catalog tableOfContents "A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet, J.-J. Quisquater and F. Sica -- Frameproof and IPP Codes / P. Sarkar and D. R. Stinson -- Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini, H. Wang and C. Xing -- Selective Receipt in Certified E-Mail / S. Kremer and O. Markowitch -- Spatial Domain Digital Watermaking with Buyer Authentication / S. Maitra and D. P. Mukherjee -- Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee, K. Kim and J. Ma -- An Analysis of Integrity Services in Protocols / K. Viswanathan, C. Boyd and E. Dawson -- Cryptanalysis of the Nonlinear FeedForward Generator / S. S. Bedi and N. R. Pillai -- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer, A. Menezes and E. Teske -- ".
- catalog tableOfContents "Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef and G. Gong -- Robust and Secure Broadcasting / Y. Mu and V. Varadharajan -- Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan, C. P. Rangan and V. Kamakoti -- Autocorrelation Properties of Correlation Immune Boolean Functions / S. Maitra -- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova and Y. Tarannikov -- A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh -- Efficient "on the Fly" Signature Schemes Based on Integer Factoring / T. Okamoto, M. Tada and A. Miyaji -- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha -- Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury and S. Maitra -- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim, S. Kim and I. Yie / [et al.] -- ".
- catalog tableOfContents "Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut -- Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer -- A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi and H. Tanaka -- A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar and P. J. Schellenberg -- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining / B.-M. Goi, M. U. Siddiqi and H.-T. Chuah -- Multiples of Primitive Polynomials over GF(2) / K. C. Gupta and S. Maitra -- Fast Generation of Cubic Irreducible Polynomials for XTR / J. M. Kim, I. Yie and S. I. Oh / [et al.] -- Cheating Prevention in Secret Sharing over GF(p[superscript t]) / J. Pieprzyk and X.-M. Zhang -- An Application of Sieve Methods to Elliptic Curves / S. A. Miri and V. K. Murty -- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier -- ".
- catalog tableOfContents "Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun, M. Xuanqin and C. Yuanlong -- Re-dividing Complexity between Algorithms and Keys (Key Scripts) / G. Samid -- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz.".
- catalog title "INDOCRYPT 2001".
- catalog title "Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings / C. Pandu Rangan, Cunsheng Ding (eds.).".
- catalog type "Conference proceedings. fast".
- catalog type "Madras (2001) swd".
- catalog type "text".