Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008916517/catalog> ?p ?o. }
Showing items 1 to 30 of
30
with 100 items per page.
- catalog alternative "CT-RSA 2002".
- catalog contributor b12520302.
- catalog contributor b12520303.
- catalog created "c2002.".
- catalog date "2002".
- catalog date "c2002.".
- catalog dateCopyrighted "c2002.".
- catalog description "Includes bibliographical references and index.".
- catalog description "Known Plaintext Correlation Attack against RC5 / Atsuko Miyaji, Masao Nonaka and Yoshinori Takii -- Micropayments Revisited / Silvio Micali and Ronald L. Rivest -- Proprietary Certificates / Markus Jakobsson, Ari Juels and Phong Q. Nguyen -- Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption / Giuseppe Ateniese and Cristina Nita-Rotaru -- RSA-Based Undeniable Signatures for General Moduli / Steven D. Galbraith, Wenbo Mao and Kenneth G. Paterson -- Co-operatively Formed Group Signatures / Greg Maitland and Colin Boyd -- Transitive Signature Schemes / Silvio Micali and Ronald L. Rivest -- Homomorphic Signature Schemes / Robert Johnson, David Molnar and Dawn Song / [et al.] -- GEM: A Generic Chosen-Ciphertext Secure Encryption Method / Jean-Sebastien Coron, Helena Handschuh and Marc Joye / [et al.] -- Securing "Encryption + Proof of Knowledge" in the Random Oracle Model / Masayuki Abe -- ".
- catalog description "Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture / Qi Cheng and Shigenori Uchiyama -- Secure Key-Evolving Protocols for Discrete Logarithm Schemes / Cheng-Fen Lu and Shiuh Pyng Winston Shieh.".
- catalog description "On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski, Jr. -- Observability Analysis -- Detecting When Improved Cryptosystems Fail / Marc Joye, Jean-Jacques Quisquater and Sung-Ming Yen / [et al.] -- Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli / Colin D. Walter -- Montgomery in Practice: How to Do It More Efficiently in Hardware / Lejla Batina and Geeke Muurling -- MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis / Colin D. Walter -- An ASIC Implementation of the AES SBoxes / Johannes Wolkerstorfer, Elisabeth Oswald and Mario Lamberger -- On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function / Marc Fischlin -- The Representation Problem Based on Factoring / Marc Fischlin and Roger Fischlin -- Ciphers with Arbitrary Finite Domains / John Black and Phillip Rogaway -- ".
- catalog extent "x, 309 p. :".
- catalog identifier "3540432248".
- catalog isPartOf "Lecture notes in computer science 0302-9743 ; 2271".
- catalog issued "2002".
- catalog issued "c2002.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.82 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data protection Congresses.".
- catalog subject "QA76.9.A25 R753 2002".
- catalog tableOfContents "Known Plaintext Correlation Attack against RC5 / Atsuko Miyaji, Masao Nonaka and Yoshinori Takii -- Micropayments Revisited / Silvio Micali and Ronald L. Rivest -- Proprietary Certificates / Markus Jakobsson, Ari Juels and Phong Q. Nguyen -- Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption / Giuseppe Ateniese and Cristina Nita-Rotaru -- RSA-Based Undeniable Signatures for General Moduli / Steven D. Galbraith, Wenbo Mao and Kenneth G. Paterson -- Co-operatively Formed Group Signatures / Greg Maitland and Colin Boyd -- Transitive Signature Schemes / Silvio Micali and Ronald L. Rivest -- Homomorphic Signature Schemes / Robert Johnson, David Molnar and Dawn Song / [et al.] -- GEM: A Generic Chosen-Ciphertext Secure Encryption Method / Jean-Sebastien Coron, Helena Handschuh and Marc Joye / [et al.] -- Securing "Encryption + Proof of Knowledge" in the Random Oracle Model / Masayuki Abe -- ".
- catalog tableOfContents "Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture / Qi Cheng and Shigenori Uchiyama -- Secure Key-Evolving Protocols for Discrete Logarithm Schemes / Cheng-Fen Lu and Shiuh Pyng Winston Shieh.".
- catalog tableOfContents "On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski, Jr. -- Observability Analysis -- Detecting When Improved Cryptosystems Fail / Marc Joye, Jean-Jacques Quisquater and Sung-Ming Yen / [et al.] -- Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli / Colin D. Walter -- Montgomery in Practice: How to Do It More Efficiently in Hardware / Lejla Batina and Geeke Muurling -- MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis / Colin D. Walter -- An ASIC Implementation of the AES SBoxes / Johannes Wolkerstorfer, Elisabeth Oswald and Mario Lamberger -- On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function / Marc Fischlin -- The Representation Problem Based on Factoring / Marc Fischlin and Roger Fischlin -- Ciphers with Arbitrary Finite Domains / John Black and Phillip Rogaway -- ".
- catalog title "CT-RSA 2002".
- catalog title "Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings / Bart Preneel (ed.)".
- catalog type "Conference proceedings. fast".
- catalog type "text".