Joan Daemen, Vincent Rijmen (auth.), Alfred Menezes, Palash Sarkar (eds.)3540002634, 9783540002635
Table of contents :
Security of a Wide Trail Design….Pages 1-11
Fast Algorithms for Determining the Linear Complexity of Period Sequences….Pages 12-21
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures….Pages 22-33
Slide Attack on Spectr-H64….Pages 34-47
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract)….Pages 48-61
A Variant of NTRU with Non-invertible Polynomials….Pages 62-70
Tree Replacement and Public Key Cryptosystem….Pages 71-78
Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System….Pages 79-92
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement….Pages 93-107
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI)….Pages 108-121
Towards Logically and Physically Secure Public-Key Infrastructures….Pages 122-134
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme….Pages 135-148
A 2-Secure Code with Efficient Tracing Algorithm….Pages 149-163
Reed Solomon Codes for Digital Fingerprinting….Pages 163-175
A Note on the Malleability of the El Gamal Cryptosystem….Pages 176-184
Authentication of Concast Communication….Pages 185-198
Self-certified Signatures….Pages 199-214
Identity Based Authenticated Group Key Agreement Protocol….Pages 215-233
Construction of Cryptographically Important Boolean Functions….Pages 234-245
Evolving Boolean Functions Satisfying Multiple Criteria….Pages 246-259
Further Results Related to Generalized Nonlinearity….Pages 260-274
Modular Multiplication in GF(p k ) Using Lagrange Representation….Pages 275-284
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map….Pages 285-295
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks….Pages 296-313
The Design and Implementation of Improved Secure Cookies Based on Certificate….Pages 314-325
A Certified E-mail System with Receiver’s Selective Usage of Delivery Authority….Pages 326-338
Spending Offline Divisible Coins with Combining Capability….Pages 339-353
Efficient Object-Based Stream Authentication….Pages 354-367
The Security of a Mix-Center Based on a Semantically Secure Cryptosystem….Pages 368-381
New Identity Escrow Scheme for Anonymity Authentication….Pages 382-394
On Unconditionally Secure Distributed Oblivious Transfer….Pages 395-408
Non-perfect Secret Sharing over General Access Structures….Pages 409-421
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure….Pages 422-435
Reviews
There are no reviews yet.