close
1.

図書

図書
Eric Donkor, Andrew R. Pirich, Howard E. Brandt ; sponsored and published by SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE, c2003  vii, 312 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 5105
所蔵情報: loading…
2.

図書

図書
Dan Boneh (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  xii, 630 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2729
所蔵情報: loading…
3.

図書

図書
Pil Joong Lee, Chae Hoon Lim (eds.)
出版情報: Berlin ; Tokyo : Springer-Verlag, c2003  xi, 536 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2587
所蔵情報: loading…
4.

図書

図書
Kenneth G. Paterson (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  ix, 383 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2898
所蔵情報: loading…
目次情報: 続きを見る
Coding and Applications
Recent Developments in Array Error-Control Codes / Patrick Guy Farrell
High Rate Convolutional Codes with Optimal Cycle Weights / Eirik Rosnes ; Øyvind Ytrehus
A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes / Lina Fagoonee ; Bahram Honary
Commitment Capacity of Discrete Memoryless Channels / Andreas Winter ; Anderson C.A. Nascimento ; Hideki Imai
Separating and Intersecting Properties of BCH and Kasami Codes / Hans Georg Schaathun ; Tor Helleseth
Applications of Coding in Cryptography
Analysis and Design of Modern Stream Ciphers / Thomas Johansson
Improved Fast Correlation Attack Using Low Rate Codes / Havard Molland ; John Erik Mathiassen
On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions / Yuri Borissov ; An Braeken ; Svetla Nikova ; Bart Preneel
Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class / Enes Pasalic
Differential Uniformity for Arrays / K.J. Horadam
Cryptography
Uses and Abuses of Cryptography / Richard Walton
A Designer's Guide to KEMs / Alexander W. Dent
A General Construction of IND-CCA2 Secure Public Key Encryption / Eike Kiltz ; John Malone-Lee
Efficient Key Updating Signature Schemes Based on IBS / Dae Hyun Yum ; Pil Joong Lee
Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity / Harald Niederreiter ; Igor E. Shparlinski
Cryptanalysis
Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic / Robert Granger
Resolving Large Prime(s) Variants for Discrete Logarithm Computation / A.J. Holt ; J.H. Davenport
Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups / Katharina Geißler ; Nigel P. Smart ; George Petrides
More Detail for a Combined Timing and Power Attack against Implementations of RSA / Werner Schindler ; Colin D. Walter
Predicting the Inversive Generator / Simon R. Blackburn ; Domingo Gomez-Perez ; Jaime Gutierrez
A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002
Analysis of Double Block Length Hash Functions / Mitsuhiro Hattori ; Shoichi Hirose ; Susumu Yoshida
Network Security and Protocols
Cryptography in Wireless Standards (Invited Paper) / Valtteri Niemi
On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms / Tetsu Iwata ; Kaoru Kurosawa
A General Attack Model on Hash-Based Client Puzzles / Geraint Price
Tripartite Authenticated Key Agreement Protocols from Pairings / Sattam S. Al-Riyami ; Kenneth G. Paterson
Remote User Authentication Using Public Information / Chris J. Mitchell
Mental Poker Revisited / Adam Barnett
Author Index
Coding and Applications
Recent Developments in Array Error-Control Codes / Patrick Guy Farrell
High Rate Convolutional Codes with Optimal Cycle Weights / Eirik Rosnes ; Øyvind Ytrehus
5.

図書

図書
Thomas Johansson, Subhamoy Maitra (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xi, 429 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2904
所蔵情報: loading…
目次情報: 続きを見る
Invited Talks
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter
Forensic Computing / X. Li ; J. Seberry
Stream Cipher
Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation / P. Sarkar
Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator / S. Paul ; B. Preneel
Block Cipher
Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA / H.M. Yildirim
Impossible Differential Cryptanalysis for Block Cipher Structures / J. Kim ; S. Hong ; J. Sung ; S. Lee ; J. Lim ; S. Sung
Impossible Differential Attack on 30-Round SHACAL-2 / G. Kim ; C. Lee
Boolean Function
Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria / K.C. Gupta
Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria / S. Kavut ; M.D. Yücel
Secrect Sharing
On Multiplicative Linear Secret Sharing Schemes / V. Nikov ; S. Nikova
A New (2,n)-Visual Threshold Scheme for Color Images / A. Adhikari ; S. Sikdar
On the Power of Computational Secret Sharing / V. Vinod ; A. Narayanan ; K. Srinathan ; C.P. Rangan ; K. Kim
Bilinear Pairing
Identity-Based Broadcasting / Y. Mu ; W. Susilo ; Y.-X. Lin
Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings / F. Zhang ; R. Safavi-Naini
Extending Joux's Protocol to Multi Party Key Agreement / R. Barua ; R. Dutta
Public Key
Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups / P.J. Abisha ; D.G. Thomas ; K.G. Subramanian
Prime Numbers of Diffie-Hellman Groups for IKE-MODP / I. Yie ; S. Lim ; S. Kim ; D. Kim
Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems / F. Levy-dit-Vehel ; L. Perret
Signature Scheme
Security Analysis of Several Group Signature Schemes / G. Wang
Forking Lemmas for Ring Signature Schemes / J. Herranz ; G. Saez
Protocol
Practical Mental Poker Without a TTP Based on Homomorphic Encryption / J. Castellà-Roca ; J. Domingo-Ferrer ; A. Riera ; J. Borrell
Lightweight Mobile Credit-Card Payment Protocol / S. Kungpisdan ; B. Srinivasan ; P.D. Le
Elliptic Curve & Algebraic Geometry
On the Construction of Prime Order Elliptic Curves / E. Konstantinou ; Y.C. Stamatiou ; C. Zaroliagis
Counting Points on an Abelian Variety over a Finite Field / F.A. Izadi ; V.K. Murty
Implementation & Digital Watermarking
Side Channel Attack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication / K. Okeya ; D.-G. Han
Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(pm) / G. Bertoni ; J. Guajardo ; G. Orlando
Cryptanalysis of Block Based Spatial Domain Watermarking Schemes / T.K. Das
Authentication
More Efficient Password Authenticated Key Exchange Based on RSA / D.S. Wong ; A.H. Chan ; F. Zhu
A Password-Based Authenticator: Security Proof and Applications / Y. Hitchcock ; Y.S.T. Tin ; J.M. Gonzalez-Nieto ; C. Boyd ; P. Montague
Stronger Security Bounds for OMAC, TMAC, and XCBC / T. Iwata ; K. Kurosawa
Progressive Verification: The Case of Message Authentication / M. Fischlin
Author Index
Invited Talks
Linear Complexity and Related Complexity Measures for Sequences / H. Niederreiter
Forensic Computing / X. Li ; J. Seberry
6.

図書

図書
Colin D. Walter, Çetin K. Koç, Christof Paar (eds.)
出版情報: Berlin ; Tokyo : Springer, c2003  xiii, 440 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2779
所蔵情報: loading…
7.

図書

図書
Chi Sung Laih (ed.)
出版情報: Berlin ; Tokyo : Springer, c2003  xiii, 542 p. ; 24 cm
シリーズ名: Lecture notes in computer science ; 2894
所蔵情報: loading…
目次情報: 続きを見る
Chosen-Ciphertext Security without Redundancy / Duong Hieu Phan ; David PointchevalPublic Key Cryptography I:
Some RSA-Based Encryption Schemes with Tight Security Reduction / Kaoru Kurosawa ; Tsuyoshi Takagi
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications / Emmanuel Bresson ; Dario Catalano
Factoring Estimates for a 1024-Bit RSA Modulus / Arjen Lenstra ; Eran Tromer ; Adi Shamir ; Wil Kortsmit ; Bruce Dodson ; James Hughes ; Paul LeylandNumber Theory I:
Index Calculus Attack for Hyperelliptic Curves of Small Genus / Nicolas Theriault
Efficient Implementations
Parallelizing Explicit Formula for Arithmetic in the Jacobian of Hyperelliptic Curves / Pradeep Kumar Mishra ; Palash Sarkar
Key Management and Protocols / Iwan Duursma ; Hyang-Sook Lee ; David R. Kohel
Key Management Schemes for Stateless Receivers Based on Time Varying Heterogeneous Logical Key Hierarchy / Miodrag J. Mihaljevic
Leakage-Resilient Authenticated Key Establishment Protocols / SeongHan Shin ; Kazukuni Kobara ; Hideki Imai
Untraceable Fair Network Payment Protocols with Off-Line TTP / Chih-Hung Wang
Hash Functions
Incremental Multiset Hash Functions and Their Application to Memory Integrity Checking / Dwaine Clarke ; Srinivas Devadas ; Marten van Dijk ; Blaise Gassend ; G. Edward Suh
New Parallel Domain Extenders for UOWHF / Wonil Lee ; Donghoon Chang ; Sangjin Lee ; Soohak Sung ; Mridul Nandi
Cryptanalysis of 3-Pass HAVAL / Bart Van Rompay ; Alex Biryukov ; Bart Preneel ; Joos Vandewalle
Group Signatures
Efficient Group Signatures without Trapdoors / Giuseppe Ateniese ; Breno de Medeiros
Accumulating Composites and Improved Group Signing / Gene Tsudik ; Shouhuai Xu
Almost Uniform Density of Power Residues and the Provable Security of ESIGN / Tatsuaki Okamoto ; Jacques Stern
Rotations and Translations of Number Field Sieve Polynomials / Jason E. GowerNumber Theory II:
On Class Group Computations Using the Number Field Sieve / Mark L. Bauer ; Safuat Hamdy
Invited Talk
The Secret and Beauty of Ancient Chinese Padlocks / Hong-Sen Yan ; Hsing-Hui Huang
Block Ciphers
A Traceable Block Cipher / Olivier Billet ; Henri Gilbert
A New Attack against Khazad / Frédéric Muller
Broadcast and Multicast
An Efficient Public Key Trace and Revoke Scheme Secure against Adaptive Chosen Ciphertext Attack / Chong Hee Kim ; Yong Ho Hwang ; Pil Joong Lee
Sequential Key Derivation Patterns for Broadcast Encryption and Key Predistribution Schemes / Nuttapong Attrapadung
Foundations and Complexity Theory
Boneh et al.'s k-Element Aggregate Extraction Assumption Is Equivalent to the Diffie-Hellman Assumption / Jean-Sebastien Coron ; David Naccache
On Diophantine Complexity and Statistical Zero-Knowledge Arguments / Helger Lipmaa
Verifiable Homomorphic Oblivious Transfer and Private Equality Test
Generalized Powering Functions and Their Application to Digital Signatures / Hisayoshi Sato ; Satoru Tezuka ; Kazuo TakaragiPublic Key Cryptography II:
Certificateless Public Key Cryptography / Sattam S. Al-Riyami ; Kenneth G. Paterson
A Complete and Explicit Security Reduction Algorithm for RSA-Based Cryptosystems / Katja Schmidt-Samoa
The Insecurity of Esign in Practical Implementations / Pierre-Alain Fouque ; Nick Howgrave-Graham ; Gwenaelle Martinet ; Guillaume Poupard
Digital Signature
Efficient One-Time Proxy Signatures / Huaxiong Wang ; Josef Pieprzyk
Universal Designated-Verifier Signatures / Ron Steinfeld ; Laurence Bull
Author Index
Chosen-Ciphertext Security without Redundancy / Duong Hieu Phan ; David PointchevalPublic Key Cryptography I:
Some RSA-Based Encryption Schemes with Tight Security Reduction / Kaoru Kurosawa ; Tsuyoshi Takagi
A Simple Public-Key Cryptosystem with a Double Trapdoor Decryption Mechanism and Its Applications / Emmanuel Bresson ; Dario Catalano
8.

図書

図書
Yuri I. Ozhigov, editor ; organized by FTIAN--Institute of Physics and Technology, Russian Academy of Sciences ... [et al.] ; sponsored by Russian Foundation for Fundamental Research ... [et al.] ; published by SPIE--the International Society for Optical Engineering
出版情報: Bellingham, Wash. : SPIE, c2003  ix, 214 p. ; 28 cm
シリーズ名: Proceedings / SPIE -- the International Society for Optical Engineering ; v. 5128
所蔵情報: loading…
文献の複写および貸借の依頼を行う
 文献複写・貸借依頼