Progress In Cryptology - Indocrypt 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceed by Thomas JohanssonProgress In Cryptology - Indocrypt 2003: 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceed by Thomas Johansson

Progress In Cryptology - Indocrypt 2003: 4th International Conference on Cryptology in India, New…

byThomas JohanssonEditorSubhamoy Maitra

Paperback | November 25, 2003

Pricing and Purchase Info

$125.55 online 
$150.50 list price save 16%
Earn 628 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003.The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and authentication.
Title:Progress In Cryptology - Indocrypt 2003: 4th International Conference on Cryptology in India, New…Format:PaperbackDimensions:436 pages, 23.5 × 15.5 × 0.07 inPublished:November 25, 2003Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540206094

ISBN - 13:9783540206095

Look for similar items by category:

Reviews

Table of Contents

Invited Talks.- Linear Complexity and Related Complexity Measures for Sequences.- Forensic Computing.- Stream Cipher.- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation.- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.- Block Cipher.- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA.- Impossible Differential Cryptanalysis for Block Cipher Structures.- Impossible Differential Attack on 30-Round SHACAL-2.- Boolean Function.- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria.- Secrect Sharing.- On Multiplicative Linear Secret Sharing Schemes.- A New (2,n)-Visual Threshold Scheme for Color Images.- On the Power of Computational Secret Sharing.- Bilinear Pairing.- Identity-Based Broadcasting.- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.- Extending Joux's Protocol to Multi Party Key Agreement.- Public Key.- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Prime Numbers of Diffie-Hellman Groups for IKE-MODP.- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems.- Signature Scheme.- Security Analysis of Several Group Signature Schemes.- Forking Lemmas for Ring Signature Schemes.- Protocol.- Practical Mental Poker Without a TTP Based on Homomorphic Encryption.- Lightweight Mobile Credit-Card Payment Protocol.- Elliptic Curve & Algebraic Geometry.- On the Construction of Prime Order Elliptic Curves.- Counting Points on an Abelian Variety over a Finite Field.- Implementation & Digital Watermarking.- Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication.- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ).- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes.- Authentication.- More Efficient Password Authenticated Key Exchange Based on RSA.- A Password-Based Authenticator: Security Proof and Applications.- Stronger Security Bounds for OMAC, TMAC, and XCBC.- Progressive Verification: The Case of Message Authentication.