default search action
INDOCRYPT 2002: Hyderabad, India
- Alfred Menezes, Palash Sarkar:
Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002. Lecture Notes in Computer Science 2551, Springer 2002, ISBN 3-540-00263-4
Invited Talks
- Joan Daemen, Vincent Rijmen:
Security of a Wide Trail Design. 1-11 - Guozhen Xiao, Shimin Wei:
Fast Algorithms for Determining the Linear Complexity of Period Sequences. 12-21
Symmetric Ciphers
- François Arnault, Thierry P. Berger, Abdelkader Necer:
A New Class of Stream Ciphers Combining LFSR and FCSR Architectures. 22-33 - Selçuk Kavut, Melek D. Yücel:
Slide Attack on Spectr-H64. 34-47 - Helger Lipmaa:
On Differential Properties of Pseudo-Hadamard Transform and Related Mappings. 48-61
New Public-Key Schemes
- William D. Banks, Igor E. Shparlinski:
A Variant of NTRU with Non-invertible Polynomials. 62-70 - S. C. Samuel, D. Gnanaraj Thomas, P. J. Abisha, K. G. Subramanian:
Tree Replacement and Public Key Cryptosystem. 71-78
Foundations
- Olaf Müller, Michael Nüsken:
Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System. 79-92 - B. Prabhu, K. Srinathan, C. Pandu Rangan:
Asynchronous Unconditionally Secure Computation: An Efficiency Improvement. 93-107
Public-Key Infrastructures
- Ravi Mukkamala:
QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI). 108-121 - Kapali Viswanathan, Ashutosh Saxena:
Towards Logically and Physically Secure Public-Key Infrastructures. 122-134
Fingerprinting and Watermarking
- Tanmoy Kanti Das, Subhamoy Maitra:
Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modified Robust Scheme. 135-148 - Vu Dong Tô, Reihaneh Safavi-Naini, Yejing Wang:
A 2-Secure Code with Efficient Tracing Algorithm. 149-162 - Ravi Sankar Veerubhotla, Ashutosh Saxena, Ved Prakash Gulati:
Reed Solomon Codes for Digital Fingerprinting. 163-175
Public-Key Protocols
- Douglas Wikström:
A Note on the Malleability of the El Gamal Cryptosystem. 176-184 - Mohamed Al-Ibrahim, Hossein Ghodosi, Josef Pieprzyk:
Authentication of Concast Communication. 185-198 - Byoungcheon Lee, Kwangjo Kim:
Self-certified Signatures. 199-214 - K. C. Reddy, Divya Nalla:
Identity Based Authenticated Group Key Agreement Protocol. 215-233
Boolean Functions
- Soumen Maity, Thomas Johansson:
Construction of Cryptographically Important Boolean Functions. 234-245 - John A. Clark, Jeremy L. Jacob, Susan Stepney, Subhamoy Maitra, William Millan:
Evolving Boolean Functions Satisfying Multiple Criteria. 246-259 - Sugata Gangopadhyay, Subhamoy Maitra:
Further Results Related to Generalized Nonlinearity. 260-274
Efficient and Secure Implementations
- Jean-Claude Bajard, Laurent Imbert, Christophe Nègre:
Modular Multiplication in GF(pk) Using Lagrange Representation. 275-284 - YoungJu Choie, Jong Won Lee:
Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map. 285-295 - Tetsuya Izu, Bodo Möller, Tsuyoshi Takagi:
Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks. 296-313
Applications
- Jong-Phil Yang, Kyung Hyune Rhee:
The Design and Implementation of Improved Secure Cookies Based on Certificate. 314-325 - Kenji Imamoto, Kouichi Sakurai:
A Certified E-mail System with Receiver's Selective Usage of Delivery Authority. 326-338 - Eikoh Chida, Yosuke Kasai, Masahiro Mambo, Hiroki Shizuya:
Spending Offline Divisible Coins with Combining Capability. 339-353 - Yongdong Wu, Di Ma, Changsheng Xu:
Efficient Object-Based Stream Authentication. 354-367
Anonymity
- Douglas Wikström:
The Security of a Mix-Center Based on a Semantically Secure Cryptosystem. 368-381 - Yong-Ho Lee, Im-Yeong Lee, Hyung-Woo Lee:
New Identity Escrow Scheme for Anonymity Authentication. 382-394
Secret Sharing and Oblivious Transfer
- Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
On Unconditionally Secure Distributed Oblivious Transfer. 395-408 - K. Srinathan, N. Tharani Rajan, C. Pandu Rangan:
Non-perfect Secret Sharing over General Access Structures. 409-421 - Ventzislav Nikov, Svetla Nikova, Bart Preneel, Joos Vandewalle:
On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure. 422-436
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.