Anne Canteaut (auth.), C. Pandu Rangan, Cunsheng Ding (eds.)3540430105, 9783540430100
Table of contents :
Cryptographic Functions and Design Criteria for Block Ciphers….Pages 1-16
Mobile Agent Route Protection through Hash-Based Mechanisms….Pages 17-29
A New Anonymous Fingerprinting Scheme with High Enciphering Rate….Pages 30-39
A Parallel Algorithm for Extending Cryptographic Hash Functions….Pages 40-49
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining….Pages 50-61
Multiples of Primitive Polynomials over GF(2)….Pages 62-72
Fast Generation of Cubic Irreducible Polynomials for XTR….Pages 73-78
Cheating Prevention in Secret Sharing over GF ( p t )….Pages 79-90
An Application of Sieve Methods to Elliptic Curves….Pages 91-98
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography….Pages 99-107
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography….Pages 108-116
Frameproof and IPP Codes….Pages 117-126
Linear Authentication Codes: Bounds and Constructions….Pages 127-135
Selective Receipt in Certified E-mail….Pages 136-148
Spatial Domain Digital Watermarking with Buyer Authentication….Pages 149-161
Efficient Public Auction with One-Time Registration and Public Verifiability….Pages 162-174
An Analysis of Integrity Services in Protocols….Pages 175-187
Cryptanalysis of the Nonlinear FeedForward Generator….Pages 188-194
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree….Pages 195-213
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem….Pages 214-222
Robust and Secure Broadcasting….Pages 223-231
Toward Optimal Player Weights in Secure Distributed Protocols….Pages 232-241
Autocorrelation Properties of Correlation Immune Boolean Functions….Pages 242-253
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices….Pages 254-266
A Twin Algorithm for Efficient Generation of Digital Signatures….Pages 267-274
Efficient “on the Fly” Signature Schemes Based on Integer Factoring….Pages 275-286
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator….Pages 287-296
Efficient Software Implementation of Linear Feedback Shift Registers….Pages 297-307
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001….Pages 308-315
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography….Pages 316-329
Re-dividing Complexity between Algorithms and Keys….Pages 330-338
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function….Pages 339-349
Reviews
There are no reviews yet.