Progress in cryptology -- INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8--10, 2003. Proceedings (Q1418352)
From MaRDI portal
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Progress in cryptology -- INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8--10, 2003. Proceedings |
scientific article |
Statements
Progress in cryptology -- INDOCRYPT 2003. 4th international conference on cryptology in India, New Delhi, India, December 8--10, 2003. Proceedings (English)
0 references
11 January 2004
0 references
The articles of this volume will be reviewed individually. The preceding conference has been reviewed (see Zbl 1014.00038). Indexed articles: \textit{Niederreiter, Harald}, Linear complexity and related complexity measures for sequences, 1-17 [Zbl 1123.94331] \textit{Li, Xiang; Seberry, Jennifer}, Forensic computing, 18-35 [Zbl 1123.68334] \textit{Sarkar, Palash}, Hiji-bij-bij: a new stream cipher with a self-synchronizing mode of operation, 36-51 [Zbl 1123.94359] \textit{Paul, Souradyuti; Preneel, Bart}, Analysis of non-fortuitous predictive states of the RC4 keystream generator, 52-67 [Zbl 1123.94356] \textit{Yıldırım, Hamdi Murat}, Nonlinearity properties of the mixing operations of the block cipher IDEA, 68-81 [Zbl 1123.94367] \textit{Kim, Jongsung; Hong, Seokhie; Sung, Jaechul; Lee, Sangjin; Lim, Jongin; Sung, Soohak}, Impossible differential cryptanalysis for block cipher structures, 82-96 [Zbl 1123.94352] \textit{Hong, Seokhie; Kim, Jongsung; Kim, Guil; Sung, Jaechul; Lee, Changhoon; Lee, Sangjin}, Impossible differential attack on 30-round SHACAL-2, 97-106 [Zbl 1123.94345] \textit{Gupta, Kishan Chand; Sarkar, Palash}, Construction of perfect nonlinear and maximally nonlinear multi-output Boolean functions satisfying higher order strict avalanche criteria, 107-120 [Zbl 1123.94340] \textit{Kavut, Selçuk; Yücel, Melek D.}, Improved cost function in the design of Boolean functions satisfying multiple criteria, 121-134 [Zbl 1123.94415] \textit{Nikov, Ventzislav; Nikova, Svetla; Preneel, Bart}, On multiplicative linear secret sharing schemes, 135-147 [Zbl 1123.94380] \textit{Adhikari, Avishek; Sikdar, Somnath}, A new \((2,n)\)-visual threshold scheme for color images, 148-161 [Zbl 1123.94373] \textit{Vinod, V.; Narayanan, Arvind; Srinathan, K.; Rangan, C. Pandu; Kim, Kwangjo}, On the power of computational secret sharing, 162-176 [Zbl 1123.94382] \textit{Mu, Yi; Susilo, Willy; Lin, Yan-Xia}, Identity-based broadcasting, 177-190 [Zbl 1123.94379] \textit{Zhang, Fangguo; Safavi-Naini, Reihaneh; Susilo, Willy}, Efficient verifiably encrypted signature and partially blind signature from bilinear pairings, 191-204 [Zbl 1123.94369] \textit{Barua, Rana; Dutta, Ratna; Sarkar, Palash}, Extending Joux's protocol to multi party key agreement (extended abstract)., 205-217 [Zbl 1123.94376] \textit{Abisha, P. J.; Thomas, D. G.; Subramanian, K. G.}, Public key cryptosystems based on free partially commutative monoids and groups, 218-227 [Zbl 1123.94333] \textit{Yie, Ikkwon; Lim, Seongan; Kim, Seungjoo; Kim, Dongryeol}, Prime numbers of Diffie-Hellman groups for IKE-MODP, 228-234 [Zbl 1123.94366] \textit{Levy-dit-Vehel, Françoise; Perret, Ludovic}, Polynomial equivalence problems and applications to multivariate cryptosystems, 235-251 [Zbl 1123.94006] \textit{Wang, Guilin}, Security analysis of several group signature schemes, 252-265 [Zbl 1123.94363] \textit{Herranz, Javier; Sáez, Germán}, Forking lemmas for ring signature schemes, 266-279 [Zbl 1123.94342] \textit{Castellà-Roca, Jordi; Domingo-Ferrer, Josep; Riera, Andreu; Borrell, Joan}, Practical mental poker without a TTP based on homomorphic encryption, 280-294 [Zbl 1123.94377] \textit{Kungpisdan, Supakorn; Srinivasan, Bala; Le, Phu Dung}, Lightweight mobile credit-card payment protocol, 295-308 [Zbl 1123.94353] \textit{Konstantinou, Elisavet; Stamatiou, Yannis C.; Zaroliagis, Christos}, On the construction of prime order elliptic curves, 309-322 [Zbl 1123.14300] \textit{Izadi, Farzali A.; Murty, V. Kumar}, Counting points on an Abelian variety over a finite field, 323-333 [Zbl 1123.11302] \textit{Okeya, Katsuyuki; Han, Dong-Guk}, Side channel attack on ha-moon's countermeasure of randomized signed scalar multiplication, 334-348 [Zbl 1123.94381] \textit{Bertoni, Guido; Guajardo, Jorge; Orlando, Gerardo}, Systolic and scalable architectures for digit-serial multiplication in fields \(\text{GF}(p^m)\), 349-362 [Zbl 1123.68300] \textit{Das, Tanmoy Kanti}, Cryptanalysis of block based spatial domain watermarking schemes, 363-374 [Zbl 1123.94335] \textit{Wong, Duncan S.; Chan, Agnes H.; Zhu, Feng}, More efficient password authenticated key exchange based on RSA, 375-387 [Zbl 1123.94365] \textit{Hitchcock, Yvonne; Tin, Yiu Shing Terry; Gonzalez-Nieto, Juan Manuel; Boyd, Colin; Montague, Paul}, A password-based authenticator: security proof and applications, 388-401 [Zbl 1123.94343] \textit{Iwata, Tetsu; Kurosawa, Kaoru}, Stronger security bounds for OMAC, TMAC, and XCBC, 402-415 [Zbl 1123.94348] \textit{Fischlin, Marc}, Progressive verification: the case of message authentication, 416-429 [Zbl 1123.94337]
0 references
Cryptology
0 references
INDOCRYPT 2003
0 references
New Dehli (India)
0 references