[Lecture Notes in Computer Science] Progress in Cryptology — INDOCRYPT 2002 Volume 2551 || Identity Based Authenticated Group Key Agreement Protocol
✍ Scribed by Menezes, Alfred; Sarkar, Palash
- Book ID
- 111655986
- Publisher
- Springer Berlin Heidelberg
- Year
- 2002
- Tongue
- German
- Weight
- 272 KB
- Edition
- 2002
- Category
- Article
- ISBN
- 3540002634
No coin nor oath required. For personal study only.
✦ Synopsis
Security Of A Wide Trail Design / Joan Daemen And Vincent Rijmen -- Fast Algorithms For Determining The Linear Complexity Of Period Sequences / Guozhen Xiao And Shimin Wei -- A New Class Of Stream Ciphers Combining Lfsr And Fcsr Architectures / Francois Arnault, Thierry P. Berger And Abdelkader Necer -- Slide Attack On Spectr-h64 / Selcuk Kavut And Melek D. Yucel -- On Differential Properties Of Pseudo-hadamard Transform And Related Mappings / Helger Lipmaa -- A Variant Of Ntru With Non-invertible Polynomials / William D. Banks And Igor E. Shparlinski -- Tree Replacement And Public Key Cryptosystem / S. C. Samuel, D. G. Thomas, P. J. Abisha And K. G. Subramanian -- Never Trust Victor: An Alternative Resettable Zero-knowledge Proof System / Olaf Muller And Michael Nusken -- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement / B. Prabhu, K. Srinathan And C. Pandu Rangan -- Qpki: A Qos-based Architecture For Public-key Infrastructure (pki) / Ravi Mukkamala --^ Towards Logically And Physically Secure Public-key Infrastructures / Kapali Viswanathan And Ashutosh Saxena -- Cryptanalysis Of Optimal Differential Energy Watermarking (dew) And A Modified Robust Scheme / Tanmoy Kanti Das And Subhamoy Maitra -- A 2-secure Code With Efficient Tracing Algorithm / Vu Dong To, Reihaneh Safavi-naini And Yejing Wang -- Reed Solomon Codes For Digital Fingerprinting / Ravi Sankar Veerubhotla, Ashutosh Saxena And Ved Prakash Gulati -- A Note On The Malleability Of The El Gamal Cryptosystem / Douglas Wikstrom -- Authentication Of Concast Communication / Mohamed Al-ibrahim, Hossein Ghodosi And Josef Pieprzyk -- Self-certified Signatures / Byoungcheon Lee And Kwangjo Kim -- Identity Based Authenticated Group Key Agreement Protocol / K. C. Reddy And D. Nalla -- Construction Of Cryptographically Important Boolean Functions / Soumen Maity And Thomas Johansson --^ Evolving Boolean Functions Satisfying Multiple Criteria / John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra And William Millan -- Further Results Related To Generalized Nonlinearity / Sugata Gangopadhyay And Subhamoy Maitra -- Modular Multiplication In Gf(p[superscript K]) Using Lagrange Representation / Jean-claude Bajard, Laurent Imbert And Christophe Negre -- Speeding Up The Scalar Multiplication In The Jacobians Of Hyperelliptic Curves Using Frobenius Map / Youngju Choie And Jong Won Lee -- Improved Elliptic Curve Multiplication Methods Resistant Against Side Channel Attacks / Tetsuya Izu, Bodo Moller And Tsuyoshi Takagi -- The Design And Implementation Of Improved Secure Cookies Based On Certificate / Jong-phil Yang And Kyung-hyune Rhee -- A Certified E-mail System With Receiver's Selective Usage Of Delivery Authority / Kenji Imamoto And Kouichi Sakurai --^ Spending Offline Divisible Coins With Combining Capability / Eikoh Chida, Yosuke Kasai, Masahiro Mambo And Hiroki Shizuya -- Efficient Object-based Stream Authentication / Yongdong Wu, Di Ma And Changsheng Xu -- The Security Of A Mix-center Based On A Semantically Secure Cryptosystem / Douglas Wikstrom -- New Identity Escrow Scheme For Anonymity Authentication / Yong-ho Lee, Im-yeong Lee And Hyung-woo Lee -- On Unconditionally Secure Distributed Oblivious Transfer / Ventzislav Nikou, Svetla Nikova, Bart Preneel And Joos Vandewalle -- Non-perfect Secret Sharing Over General Access Structures / K. Srinathan, N. Tharani Rajan And C. Pandu Rangan -- On Distributed Key Distribution Centers And Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based On General Access Structure / Ventzislav Nikov, Svetla Nikova, Bart Preneel And Joos Vandewalle. Alfred Menezes, Palash Sarkar (eds.). Includes Bibliographical References And Index.
📜 SIMILAR VOLUMES
You are holding the rst in a hopefully long and successful series of RSA Cr- tographers’ Track proceedings. The Cryptographers’ Track (CT-RSA) is one of the many parallel tracks of the yearly RSA Conference. Other sessions deal with government projects, law and policy issues, freedom and privacy new