Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV017687683
    Format: XI, 429 S.
    ISBN: 3-540-20609-4
    Series Statement: Lecture notes in computer science 2904
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift ; Kongress
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_9947920557202882
    Format: XII, 436 p. , online resource.
    ISBN: 9783540245827
    Series Statement: Lecture Notes in Computer Science, 2904
    Note: Invited Talks -- Linear Complexity and Related Complexity Measures for Sequences -- Forensic Computing -- Stream Cipher -- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation -- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator -- Block Cipher -- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA -- Impossible Differential Cryptanalysis for Block Cipher Structures -- Impossible Differential Attack on 30-Round SHACAL-2 -- Boolean Function -- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria -- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria -- Secrect Sharing -- On Multiplicative Linear Secret Sharing Schemes -- A New (2,n)-Visual Threshold Scheme for Color Images -- On the Power of Computational Secret Sharing -- Bilinear Pairing -- Identity-Based Broadcasting -- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings -- Extending Joux’s Protocol to Multi Party Key Agreement -- Public Key -- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Prime Numbers of Diffie-Hellman Groups for IKE-MODP -- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems -- Signature Scheme -- Security Analysis of Several Group Signature Schemes -- Forking Lemmas for Ring Signature Schemes -- Protocol -- Practical Mental Poker Without a TTP Based on Homomorphic Encryption -- Lightweight Mobile Credit-Card Payment Protocol -- Elliptic Curve & Algebraic Geometry -- On the Construction of Prime Order Elliptic Curves -- Counting Points on an Abelian Variety over a Finite Field -- Implementation & Digital Watermarking -- Side Channel Attack on Ha-Moon’s Countermeasure of Randomized Signed Scalar Multiplication -- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ) -- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes -- Authentication -- More Efficient Password Authenticated Key Exchange Based on RSA -- A Password-Based Authenticator: Security Proof and Applications -- Stronger Security Bounds for OMAC, TMAC, and XCBC -- Progressive Verification: The Case of Message Authentication.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540206095
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_749174242
    Format: Online-Ressource (XI, 431 p. Also available online) , digital
    Edition: Springer eBook Collection. Computer Science
    ISBN: 9783540245827 , 3540206094 , 9783540206095
    Series Statement: Lecture Notes in Computer Science 2904
    Content: This book constitutes the refereed proceedings of the 4th International Conference on Cryptology in India, INDOCRYPT 2003, held in New Delhi, India in December 2003. The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 101 submissions. The papers are organized in topical sections on stream ciphers, block ciphers, Boolean functions, secret sharing, bilinear pairings, public key cryptography, signature schemes, protocols, elliptic curve cryptography and algebraic geometry, implementation and digital watermarking, and authentication
    Note: Literaturangaben
    Additional Edition: ISBN 9783540206095
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662206584
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540206095
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    almahu_9948621455602882
    Format: XII, 436 p. , online resource.
    Edition: 1st ed. 2003.
    ISBN: 9783540245827
    Series Statement: Lecture Notes in Computer Science, 2904
    Note: Invited Talks -- Linear Complexity and Related Complexity Measures for Sequences -- Forensic Computing -- Stream Cipher -- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation -- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator -- Block Cipher -- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA -- Impossible Differential Cryptanalysis for Block Cipher Structures -- Impossible Differential Attack on 30-Round SHACAL-2 -- Boolean Function -- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria -- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria -- Secrect Sharing -- On Multiplicative Linear Secret Sharing Schemes -- A New (2,n)-Visual Threshold Scheme for Color Images -- On the Power of Computational Secret Sharing -- Bilinear Pairing -- Identity-Based Broadcasting -- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings -- Extending Joux's Protocol to Multi Party Key Agreement -- Public Key -- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups -- Prime Numbers of Diffie-Hellman Groups for IKE-MODP -- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems -- Signature Scheme -- Security Analysis of Several Group Signature Schemes -- Forking Lemmas for Ring Signature Schemes -- Protocol -- Practical Mental Poker Without a TTP Based on Homomorphic Encryption -- Lightweight Mobile Credit-Card Payment Protocol -- Elliptic Curve & Algebraic Geometry -- On the Construction of Prime Order Elliptic Curves -- Counting Points on an Abelian Variety over a Finite Field -- Implementation & Digital Watermarking -- Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication -- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ) -- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes -- Authentication -- More Efficient Password Authenticated Key Exchange Based on RSA -- A Password-Based Authenticator: Security Proof and Applications -- Stronger Security Bounds for OMAC, TMAC, and XCBC -- Progressive Verification: The Case of Message Authentication.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783662206584
    Additional Edition: Printed edition: ISBN 9783540206095
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_37416178X
    Format: XI, 429 S. , Ill., graph. Darst.
    ISBN: 3540206094
    Series Statement: Lecture notes in computer science 2904
    Note: Literaturangaben
    Additional Edition: Erscheint auch als Online-Ausgabe Johansson, Thomas Progress in Cryptology -- INDOCRYPT 2003 Berlin, Heidelberg : Springer Berlin Heidelberg, 2003 ISBN 9783540206095
    Language: German
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9783540106395?
Did you mean 9783540200659?
Did you mean 9783540006091?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages