Matches in Harvard for { <http://id.lib.harvard.edu/aleph/009103684/catalog> ?p ?o. }
Showing items 1 to 32 of
32
with 100 items per page.
- catalog alternative "INDOCRYPT 2002".
- catalog contributor b12819921.
- catalog contributor b12819922.
- catalog contributor b12819923.
- catalog created "2002.".
- catalog date "2002".
- catalog date "2002.".
- catalog dateCopyrighted "2002.".
- catalog description "Evolving Boolean Functions Satisfying Multiple Criteria / John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra and William Millan -- Further Results Related to Generalized Nonlinearity / Sugata Gangopadhyay and Subhamoy Maitra -- Modular Multiplication in GF(p[superscript k]) Using Lagrange Representation / Jean-Claude Bajard, Laurent Imbert and Christophe Negre -- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map / YoungJu Choie and Jong Won Lee -- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks / Tetsuya Izu, Bodo Moller and Tsuyoshi Takagi -- The Design and Implementation of Improved Secure Cookies Based on Certificate / Jong-Phil Yang and Kyung-Hyune Rhee -- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority / Kenji Imamoto and Kouichi Sakurai -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Security of a Wide Trail Design / Joan Daemen and Vincent Rijmen -- Fast Algorithms for Determining the Linear Complexity of Period Sequences / Guozhen Xiao and Shimin Wei -- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures / Francois Arnault, Thierry P. Berger and Abdelkader Necer -- Slide Attack on Spectr-H64 / Selcuk Kavut and Melek D. Yucel -- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings / Helger Lipmaa -- A Variant of NTRU with Non-invertible Polynomials / William D. Banks and Igor E. Shparlinski -- Tree Replacement and Public Key Cryptosystem / S. C. Samuel, D. G. Thomas, P. J. Abisha and K. G. Subramanian -- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System / Olaf Muller and Michael Nusken -- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement / B. Prabhu, K. Srinathan and C. Pandu Rangan -- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI) / Ravi Mukkamala -- ".
- catalog description "Spending Offline Divisible Coins with Combining Capability / Eikoh Chida, Yosuke Kasai, Masahiro Mambo and Hiroki Shizuya -- Efficient Object-Based Stream Authentication / Yongdong Wu, Di Ma and Changsheng Xu -- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem / Douglas Wikstrom -- New Identity Escrow Scheme for Anonymity Authentication / Yong-Ho Lee, Im-Yeong Lee and Hyung-Woo Lee -- On Unconditionally Secure Distributed Oblivious Transfer / Ventzislav Nikou, Svetla Nikova, Bart Preneel and Joos Vandewalle -- Non-perfect Secret Sharing over General Access Structures / K. Srinathan, N. Tharani Rajan and C. Pandu Rangan -- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure / Ventzislav Nikov, Svetla Nikova, Bart Preneel and Joos Vandewalle.".
- catalog description "Towards Logically and Physically Secure Public-Key Infrastructures / Kapali Viswanathan and Ashutosh Saxena -- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme / Tanmoy Kanti Das and Subhamoy Maitra -- A 2-Secure Code with Efficient Tracing Algorithm / Vu Dong To, Reihaneh Safavi-Naini and Yejing Wang -- Reed Solomon Codes for Digital Fingerprinting / Ravi Sankar Veerubhotla, Ashutosh Saxena and Ved Prakash Gulati -- A Note on the Malleability of the El Gamal Cryptosystem / Douglas Wikstrom -- Authentication of Concast Communication / Mohamed Al-Ibrahim, Hossein Ghodosi and Josef Pieprzyk -- Self-certified Signatures / Byoungcheon Lee and Kwangjo Kim -- Identity Based Authenticated Group Key Agreement Protocol / K. C. Reddy and D. Nalla -- Construction of Cryptographically Important Boolean Functions / Soumen Maity and Thomas Johansson -- ".
- catalog extent "xi, 435 p. :".
- catalog identifier "3540002634 (softcover : alk. paper)".
- catalog isPartOf "Lecture notes in computer science ; 2551".
- catalog issued "2002".
- catalog issued "2002.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.8/2 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "QA76.9.A25 I5535 2002".
- catalog tableOfContents "Evolving Boolean Functions Satisfying Multiple Criteria / John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra and William Millan -- Further Results Related to Generalized Nonlinearity / Sugata Gangopadhyay and Subhamoy Maitra -- Modular Multiplication in GF(p[superscript k]) Using Lagrange Representation / Jean-Claude Bajard, Laurent Imbert and Christophe Negre -- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map / YoungJu Choie and Jong Won Lee -- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks / Tetsuya Izu, Bodo Moller and Tsuyoshi Takagi -- The Design and Implementation of Improved Secure Cookies Based on Certificate / Jong-Phil Yang and Kyung-Hyune Rhee -- A Certified E-mail System with Receiver's Selective Usage of Delivery Authority / Kenji Imamoto and Kouichi Sakurai -- ".
- catalog tableOfContents "Security of a Wide Trail Design / Joan Daemen and Vincent Rijmen -- Fast Algorithms for Determining the Linear Complexity of Period Sequences / Guozhen Xiao and Shimin Wei -- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures / Francois Arnault, Thierry P. Berger and Abdelkader Necer -- Slide Attack on Spectr-H64 / Selcuk Kavut and Melek D. Yucel -- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings / Helger Lipmaa -- A Variant of NTRU with Non-invertible Polynomials / William D. Banks and Igor E. Shparlinski -- Tree Replacement and Public Key Cryptosystem / S. C. Samuel, D. G. Thomas, P. J. Abisha and K. G. Subramanian -- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System / Olaf Muller and Michael Nusken -- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement / B. Prabhu, K. Srinathan and C. Pandu Rangan -- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI) / Ravi Mukkamala -- ".
- catalog tableOfContents "Spending Offline Divisible Coins with Combining Capability / Eikoh Chida, Yosuke Kasai, Masahiro Mambo and Hiroki Shizuya -- Efficient Object-Based Stream Authentication / Yongdong Wu, Di Ma and Changsheng Xu -- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem / Douglas Wikstrom -- New Identity Escrow Scheme for Anonymity Authentication / Yong-Ho Lee, Im-Yeong Lee and Hyung-Woo Lee -- On Unconditionally Secure Distributed Oblivious Transfer / Ventzislav Nikou, Svetla Nikova, Bart Preneel and Joos Vandewalle -- Non-perfect Secret Sharing over General Access Structures / K. Srinathan, N. Tharani Rajan and C. Pandu Rangan -- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure / Ventzislav Nikov, Svetla Nikova, Bart Preneel and Joos Vandewalle.".
- catalog tableOfContents "Towards Logically and Physically Secure Public-Key Infrastructures / Kapali Viswanathan and Ashutosh Saxena -- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme / Tanmoy Kanti Das and Subhamoy Maitra -- A 2-Secure Code with Efficient Tracing Algorithm / Vu Dong To, Reihaneh Safavi-Naini and Yejing Wang -- Reed Solomon Codes for Digital Fingerprinting / Ravi Sankar Veerubhotla, Ashutosh Saxena and Ved Prakash Gulati -- A Note on the Malleability of the El Gamal Cryptosystem / Douglas Wikstrom -- Authentication of Concast Communication / Mohamed Al-Ibrahim, Hossein Ghodosi and Josef Pieprzyk -- Self-certified Signatures / Byoungcheon Lee and Kwangjo Kim -- Identity Based Authenticated Group Key Agreement Protocol / K. C. Reddy and D. Nalla -- Construction of Cryptographically Important Boolean Functions / Soumen Maity and Thomas Johansson -- ".
- catalog title "INDOCRYPT 2002".
- catalog title "Progress in cryptology : INDOCRYPT 2002 : Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002 : proceedings / Alfred Menezes, Palash Sarkar (eds.).".
- catalog type "Conference proceedings. fast".
- catalog type "text".