Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16--20, 2001. Proceedings (Q5961026): Difference between revisions
From MaRDI portal
Added link to MaRDI item. |
Set OpenAlex properties. |
||
(One intermediate revision by one other user not shown) | |||
Property / MaRDI profile type | |||
Property / MaRDI profile type: MaRDI publication profile / rank | |||
Normal rank | |||
Property / full work available at URL | |||
Property / full work available at URL: https://doi.org/10.1007/3-540-45311-3 / rank | |||
Normal rank | |||
Property / OpenAlex ID | |||
Property / OpenAlex ID: W2978674311 / rank | |||
Normal rank |
Latest revision as of 14:25, 19 March 2024
scientific article; zbMATH DE number 1732153
Language | Label | Description | Also known as |
---|---|---|---|
English | Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16--20, 2001. Proceedings |
scientific article; zbMATH DE number 1732153 |
Statements
Progress in cryptology - INDOCRYPT 2001. 2nd international conference on cryptology in India, Chennai, India, December 16--20, 2001. Proceedings (English)
0 references
23 April 2002
0 references
The articles of this volume will be reviewed individually. The preceding conference (1st, 2000) has been reviewed (see Zbl 0952.00063). Indexed articles: \textit{Canteaut, Anne}, Cryptographic functions and design criteria for block ciphers, 1-16 [Zbl 1011.94545] \textit{Domingo-Ferrer, Josep}, Mobile agent route protection through hash-based mechanisms, 17-29 [Zbl 1007.68964] \textit{Kuribayashi, Minoru; Tanaka, Hatsukazu}, A new anonymous fingerprinting scheme with high enciphering rate, 30-39 [Zbl 1011.94556] \textit{Sarkar, Palash; Schellenberg, Paul J.}, A parallel algorithm for extending cryptographic hash functions. (Extended abstract), 40-49 [Zbl 1003.68744] \textit{Goi, Bok-Min; Siddiqi, M. U.; Chuah, Hean-Teik}, Incremental hash function based on pair chaining \& modular arithmetic combining, 50-61 [Zbl 1003.68504] \textit{Gupta, Kishan Chand; Maitra, Subhamoy}, Multiples of primitive polynomials over GF(2), 62-72 [Zbl 1011.94548] \textit{Kim, Jae Moon; Yie, Ikkwon; Oh, Seung Ik; Kim, Hyung Don; Ryu, Jado}, Fast generation of cubic irreducible polynomials for XTR, 73-78 [Zbl 1011.94546] \textit{Pieprzyk, Josef; Zhang, Xian-Mo}, Cheating prevention in secret sharing over \(\text{GF} (p^t)\), 79-90 [Zbl 1011.94559] \textit{Miri, S. Ali; Murty, V. Kumar}, An application of sieve methods to elliptic curves, 91-98 [Zbl 1011.94543] \textit{Baier, Harald}, Elliptic curves of prime order over optimal extension fields for use in cryptography, 99-107 [Zbl 1011.94553] \textit{Ciet, Mathieu; Quisquater, Jean-Jacques; Sica, Francesco}, A secure family of composite finite fields suitable for fast implementation of elliptic curve cryptography. (Extended abstract), 108-116 [Zbl 1011.94555] \textit{Sarkar, Palash; Stinson, Douglas R.}, Frameproof and IPP codes, 117-126 [Zbl 1011.94547] \textit{Safavi-Naini, Rei; Wang, Huaxiong; Xing, Chaoping}, Linear authentication codes: bounds and constructions, 127-135 [Zbl 1011.94562] \textit{Kremer, Steve; Markowitch, Olivier}, Selective receipt in certified e-mail, 136-148 [Zbl 1003.68615] \textit{Maitra, Subhamoy; Mukherjee, Dipti Prasad}, Spatial domain digital watermarking with buyer authentication, 149-161 [Zbl 1011.94563] \textit{Lee, Byoungcheon; Kim, Kwangjo; Ma, Joongsoo}, Efficient public auction with one-time registration and public verifiability, 162-174 [Zbl 1011.94561] \textit{Viswanathan, Kapali; Boyd, Colin; Dawson, Ed}, An analysis of integrity services in protocols, 175-187 [Zbl 1011.94558] \textit{Bedi, S. S.; Pillai, N. Rajesh}, Cryptanalysis of the nonlinear feedforward generator, 188-194 [Zbl 1003.94524] \textit{Maurer, Markus; Menezes, Alfred; Teske, Edlyn}, Analysis of the GHS Weil descent attack on the ECDLP over characteristic two finite fields of composite degree, 195-213 [Zbl 1011.94554] \textit{Youssef, Amr; Gong, Guang}, Cryptanalysis of Imai and Matsumoto scheme B asymmetric cryptosystem, 214-222 [Zbl 1011.94544] \textit{Mu, Yi; Varadharajan, Vijay}, Robust and secure broadcasting, 223-231 [Zbl 1011.94550] \textit{Srinathan, K.; Rangan, C. Pandu; Kamakoti, V.}, Toward optimal player weights in secure distributed protocols, 232-241 [Zbl 1011.94551] \textit{Maitra, Subhamoy}, Autocorrelation properties of correlation immune Boolean functions, 242-253 [Zbl 1011.94569] \textit{Fedorova, Maria; Tarannikov, Yuriy}, On the constructing of highly nonlinear resilient Boolean functions by means of special matrices, 254-266 [Zbl 1011.94570] \textit{Ramesh, D.}, A twin algorithm for efficient generation of digital signatures, 267-274 [Zbl 1011.94557] \textit{Okamoto, Takeshi; Tada, Mitsuru; Miyaji, Atsuko}, Efficient ``on the fly'' signature schemes based on integer factoring, 275-286 [Zbl 1011.94560] \textit{Kholosha, Alexander}, Clock-controlled shift registers and generalized Geffe key-stream generator, 287-296 [Zbl 1011.94540] \textit{Chowdhury, Sandeepan; Maitra, Subhamoy}, Efficient software implementation of linear feedback shift registers, 297-307 [Zbl 1011.94541] \textit{Lim, Seongan; Kim, Seungjoo; Yie, Ikkwon; Kim, Jaemoon}, Comments on a signature scheme based on the third order LFSR proposed at ACISP 2001, 308-315 [Zbl 1011.94564] \textit{Li, Shujun; Mou, Xuanqin; Cai, Yuanlong}, Pseudo-random bit generator based on couple chaotic systems and its applications in stream-cipher cryptography, 316-329 [Zbl 1011.94552] \textit{Samid, Gideon}, Re-dividing complexity between algorithms and keys: Key scripts, 330-338 [Zbl 1011.94549] \textit{Kiltz, Eike}, A tool box of cryptographic functions realted to the Diffie-Hellman function, 339-349 [Zbl 1011.94542]
0 references
Chennai (India)
0 references
Conference
0 references
Proceedings
0 references
INDOCRYPT 2001
0 references
Cryptology
0 references