skip to content
Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings Preview this item
ClosePreview this item
Checking...

Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings

Author: C Pandu Rangan; C Ding
Publisher: Berlin : Springer, 2001.
Series: Lecture notes in computer science, 2247.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Summary:

The Program Committee considered 77 papers and selected 31 papers for presentation. We wish to thank the Program Committee members who did an excellent job in reviewing the submissions in spite of  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Electronic books
Conference papers and proceedings
Madras (2001)
Congresses
Material Type: Conference publication, Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: C Pandu Rangan; C Ding
ISBN: 3540430105 9783540430100
OCLC Number: 48663017
Description: xiii, 349 pages : illustrations ; 24 cm.
Contents: Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut --
Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer --
A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi and H. Tanaka --
A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar and P.J. Schellenberg --
Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining / B.-M. Goi, M.U. Siddiqi and H.-T. Chuah --
Multiples of Primitive Polynomials over GF(2) / K.C. Gupta and S. Maitra --
Fast Generation of Cubic Irreducible Polynomials for XTR / J.M. Kim, I. Yie and S.I. Oh / [and others] --
Cheating Prevention in Secret Sharing over GF(p[superscript t]) / J. Pieprzyk and X.-M. Zhang --
An Application of Sieve Methods to Elliptic Curves / S.A. Miri and V.K. Murty --
Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier --
A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet, J.-J. Quisquater and F. Sica --
Frameproof and IPP Codes / P. Sarkar and D.R. Stinson --
Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini, H. Wang and C. Xing --
Selective Receipt in Certified E-Mail / S. Kremer and O. Markowitch --
Spatial Domain Digital Watermaking with Buyer Authentication / S. Maitra and D.P. Mukherjee --
Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee, K. Kim and J. Ma --
An Analysis of Integrity Services in Protocols / K. Viswanathan, C. Boyd and E. Dawson --
Cryptanalysis of the Nonlinear FeedForward Generator / S.S. Bedi and N.R. Pillai --
Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer, A. Menezes and E. Teske --
Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef and G. Gong --
Robust and Secure Broadcasting / Y. Mu and V. Varadharajan --
Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan, C.P. Rangan and V. Kamakoti --
Autocorrelation Properties of Correlation Immune Boolean Functions / S. Maitra --
On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova and Y. Tarannikov --
A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh --
Efficient "on the Fly" Signature Schemes Based on Integer Factoring / T. Okamoto, M. Tada and A. Miyaji --
Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha --
Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury and S. Maitra --
Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim, S. Kim and I. Yie / [and others] --
Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun, M. Xuanqin and C. Yuanlong --
Re-dividing Complexity between Algorithms and Keys (Key Scripts) / G. Samid --
A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz.
Series Title: Lecture notes in computer science, 2247.
Other Titles: INDOCRYPT 2001
Responsibility: C. Pandu Rangan, Cunsheng Ding (eds.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/48663017> # Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings
    a schema:Book, schema:CreativeWork ;
    library:oclcnum "48663017" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/364329874#Place/berlin> ; # Berlin
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/kryptologie> ; # Kryptologie
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/systemes_informatiques_mesures_de_surete_congres> ; # Systèmes informatiques--Mesures de sûreté--Congrès
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/geheimschrift> ; # Geheimschrift
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/securite_informatique_congres> ; # Sécurité informatique--Congrès
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/kongress> ; # Kongress
    schema:about <http://dewey.info/class/005.82/e21/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/cryptographie_congres> ; # Cryptographie--Congrès
    schema:about <http://experiment.worldcat.org/entity/work/data/364329874#Topic/cryptographie_inde_congres> ; # Cryptographie--Inde--Congrès
    schema:alternateName "INDOCRYPT 2001" ;
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/85212989> ; # C. Pandu Rangan
    schema:contributor <http://viaf.org/viaf/112139552> ; # Cunsheng Ding
    schema:creator <http://experiment.worldcat.org/entity/work/data/364329874#Meeting/international_conference_in_cryptology_in_india_2nd_2001_chennai_india> ; # International Conference in Cryptology in India (2nd : 2001 : Chennai, India)
    schema:datePublished "2001" ;
    schema:description "Cryptographic Functions and Design Criteria for Block Ciphers / A. Canteaut -- Mobile Agent Route Protection through Hash-Based Mechanisms / J. Domingo-Ferrer -- A New Anonymous Fingerprinting Scheme with High Enciphering Rate / M. Kuribayashi and H. Tanaka -- A Parallel Algorithm for Extending Cryptographic Hash Functions / P. Sarkar and P.J. Schellenberg -- Incremental Hash Function Based on Pair Chaining & Modular Arithmetic Combining / B.-M. Goi, M.U. Siddiqi and H.-T. Chuah -- Multiples of Primitive Polynomials over GF(2) / K.C. Gupta and S. Maitra -- Fast Generation of Cubic Irreducible Polynomials for XTR / J.M. Kim, I. Yie and S.I. Oh / [and others] -- Cheating Prevention in Secret Sharing over GF(p[superscript t]) / J. Pieprzyk and X.-M. Zhang -- An Application of Sieve Methods to Elliptic Curves / S.A. Miri and V.K. Murty -- Elliptic Curves of Prime Order over Optimal Extension Fields for Use in Cryptography / H. Baier -- A Secure Family of Composite Finite Fields Suitable for Fast Implementation of Elliptic Curve Cryptography / M. Ciet, J.-J. Quisquater and F. Sica -- Frameproof and IPP Codes / P. Sarkar and D.R. Stinson -- Linear Authentication Codes: Bounds and Constructions / R. Safavi-Naini, H. Wang and C. Xing -- Selective Receipt in Certified E-Mail / S. Kremer and O. Markowitch -- Spatial Domain Digital Watermaking with Buyer Authentication / S. Maitra and D.P. Mukherjee -- Efficient Public Auction with One-Time Registration and Public Verifiability / B. Lee, K. Kim and J. Ma -- An Analysis of Integrity Services in Protocols / K. Viswanathan, C. Boyd and E. Dawson -- Cryptanalysis of the Nonlinear FeedForward Generator / S.S. Bedi and N.R. Pillai -- Analysis of the GHS Weil Descent Attack on the ECDLP over Characteristic Two Finite Fields of Composite Degree / M. Maurer, A. Menezes and E. Teske -- Cryptanalysis of Imai and Matsumoto Scheme B Asymmetric Cryptosystem / A. Youssef and G. Gong -- Robust and Secure Broadcasting / Y. Mu and V. Varadharajan -- Toward Optimal Player Weights in Secure Distributed Protocols / K. Srinathan, C.P. Rangan and V. Kamakoti -- Autocorrelation Properties of Correlation Immune Boolean Functions / S. Maitra -- On the Constructing of Highly Nonlinear Resilient Boolean Functions by Means of Special Matrices / M. Fedorova and Y. Tarannikov -- A Twin Algorithm for Efficient Generation of Digital Signatures / D. Ramesh -- Efficient "on the Fly" Signature Schemes Based on Integer Factoring / T. Okamoto, M. Tada and A. Miyaji -- Clock-Controlled Shift Registers and Generalized Geffe Key-Stream Generator / A. Kholosha -- Efficient Software Implementation of Linear Feedback Shift Registers / S. Chowdhury and S. Maitra -- Comments on a Signature Scheme Based on the Third Order LFSR Proposed at ACISP2001 / S. Lim, S. Kim and I. Yie / [and others] -- Pseudo-random Bit Generator Based on Couple Chaotic Systems and Its Applications in Stream-Cipher Cryptography / L. Shujun, M. Xuanqin and C. Yuanlong -- Re-dividing Complexity between Algorithms and Keys (Key Scripts) / G. Samid -- A Tool Box of Cryptographic Functions Related to the Diffie-Hellman Function / E. Kiltz."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/364329874> ;
    schema:genre "Madras (2001)"@en ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:genre "Kongress"@en ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
    schema:name "Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings"@en ;
    schema:productID "48663017" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/48663017#PublicationEvent/berlin_springer_2001> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/364329874#Agent/springer> ; # Springer
    schema:url <http://swbplus.bsz-bw.de/bsz096077727cov.htm> ;
    schema:url <http://link.springer.de/link/service/series/0558/tocs/t2247.htm> ;
    schema:url <http://swbplus.bsz-bw.de/bsz096077727inh.htm> ;
    schema:url <http://www.springerlink.com/content/c5mdmph8khg8/> ;
    schema:url <http://link.springer.com/10.1007/3-540-45311-3> ;
    schema:url <http://dx.doi.org/10.1007/3-540-45311-3> ;
    schema:url <http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm> ;
    schema:workExample <http://worldcat.org/isbn/9783540430100> ;
    umbel:isLike <http://d-nb.info/963084623> ;
    umbel:isLike <http://bnb.data.bl.uk/id/resource/GBA205134> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/48663017> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/364329874#Meeting/international_conference_in_cryptology_in_india_2nd_2001_chennai_india> # International Conference in Cryptology in India (2nd : 2001 : Chennai, India)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/364329874#Place/chennai_india> ; # Chennai, India)
    schema:name "International Conference in Cryptology in India (2nd : 2001 : Chennai, India)" ;
    .

<http://experiment.worldcat.org/entity/work/data/364329874#Place/chennai_india> # Chennai, India)
    a schema:Place ;
    schema:name "Chennai, India)" ;
    .

<http://experiment.worldcat.org/entity/work/data/364329874#Topic/cryptographie_congres> # Cryptographie--Congrès
    a schema:Intangible ;
    schema:name "Cryptographie--Congrès"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/364329874#Topic/cryptographie_inde_congres> # Cryptographie--Inde--Congrès
    a schema:Intangible ;
    schema:name "Cryptographie--Inde--Congrès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/364329874#Topic/securite_informatique_congres> # Sécurité informatique--Congrès
    a schema:Intangible ;
    schema:name "Sécurité informatique--Congrès"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/364329874#Topic/systemes_informatiques_mesures_de_surete_congres> # Systèmes informatiques--Mesures de sûreté--Congrès
    a schema:Intangible ;
    schema:name "Systèmes informatiques--Mesures de sûreté--Congrès"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography"@en ;
    .

<http://link.springer.com/10.1007/3-540-45311-3>
    rdfs:comment "eBook available for UOIT via SpringerLink. Click link to access" ;
    .

<http://link.springer-ny.com/link/service/series/0558/tocs/t2247.htm>
    rdfs:comment "Restricted to Springer LINK subscribers" ;
    .

<http://viaf.org/viaf/112139552> # Cunsheng Ding
    a schema:Person ;
    schema:birthDate "1962" ;
    schema:familyName "Ding" ;
    schema:givenName "Cunsheng" ;
    schema:givenName "C." ;
    schema:name "Cunsheng Ding" ;
    .

<http://viaf.org/viaf/85212989> # C. Pandu Rangan
    a schema:Person ;
    schema:birthDate "1955" ;
    schema:familyName "Pandu Rangan" ;
    schema:givenName "C." ;
    schema:name "C. Pandu Rangan" ;
    .

<http://worldcat.org/isbn/9783540430100>
    a schema:ProductModel ;
    schema:isbn "3540430105" ;
    schema:isbn "9783540430100" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/48663017> ; # Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science ;" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/48663017>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/48663017> ; # Progress in cryptology : INDOCRYPT 2001 : Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001 : proceedings
    schema:dateModified "2017-11-17" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.