Notice bibliographique
- Notice
Type(s) de contenu et mode(s) de consultation : Texte noté : électronique
Auteur(s) : International Conference on the Theory and Application of Cryptology and Information
Security (7 ; 2001 ; Gold Coast, Qld)
Titre(s) : Advances in cryptology--ASIACRYPT 2001 [Texte électronique] : 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001 : proceedings / Colin Boyd (ed.)
Publication : Berlin ; New York : Springer, cop. 2001
Description matérielle : 1 online resource (xi, 601 pages)
Collection : Lecture notes in computer science ; 2248
Note(s) : Includes bibliographical references and index
English.
This book constitutes the refereed proceedings of the 7th International Conference
on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2001,
held in Gold Coast, Australia in December 2001. The 33 revised full papers presented
together with an invited paper were carefully reviewed and selected from 153 submissions.
The papers are organized in topical sections on lattice based cryptography, human
identification, practical public key cryptography, cryptography based on coding theory,
block ciphers, provable security, threshold cryptography, two-party protocols, zero
knowledge, cryptographic building blocks, elliptic curve cryptography, and anonymity
Autre(s) auteur(s) : Boyd, Colin (1959-....). Fonction indéterminée
Autre(s) forme(s) du titre :
- Autre forme du titre : Advances in cryptology
- Autre forme du titre : ASIACRYPT 2001
Sujet(s) : Informatique
Cryptographie
Algorithmes
Systèmes d'exploitation (ordinateurs)
Systèmes informatiques -- Mesures de sûreté
Chiffrement (informatique)
Réseaux d'ordinateurs
Authentification
Indice(s) Dewey :
005.8 (23e éd.) = Sécurité informatique
Identifiants, prix et caractéristiques : ISBN 9783540456827
Identifiant de la notice : ark:/12148/cb44690918g
Notice n° :
FRBNF44690918
(notice reprise d'un réservoir extérieur)
Table des matières : Lattice Based Cryptography ; Cryptanalysis of the NTRU Signature Scheme (NSS) from
Eurocrypt 2001 ; On the Insecurity of a Server-Aided RSA Protocol ; The Modular
Inversion Hidden Number Problem ; Human Identification ; Secure Human Identification
Protocols ; Invited Talk ; Unbelievable Security Matching AES Security Using Public
Key Systems ; Practical Public Key Cryptography ; A Probable Prime Test with Very
High Confidence for n? 1 mod 4 ; Computation of Discrete Logarithms in ; Speeding
Up XTR ; An Efficient Implementation of Braid Groups ; Cryptography Based on Coding
Theory ; How to Achieve a McEliece-Based Digital Signature Scheme ; Efficient Traitor
Tracing Algorithms Using List Decoding ; Block Ciphers ; Security of Reduced Version
of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
; Known-IV Attacks on Triple Modes of Operation of Block Ciphers ; Generic Attacks
on Feistel Schemes ; A Compact Rijndael Hardware Archi