Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings

Author:   Moti Yung
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2002 ed.
Volume:   2442
ISBN:  

9783540440505


Pages:   630
Publication Date:   05 August 2002
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $290.40 Quantity:  
Add to Cart

Share |

Advances in Cryptology - CRYPTO 2002: 22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings


Add your own review!

Overview

Full Product Details

Author:   Moti Yung
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2002 ed.
Volume:   2442
Dimensions:   Width: 15.50cm , Height: 3.30cm , Length: 23.30cm
Weight:   1.970kg
ISBN:  

9783540440505


ISBN 10:   354044050
Pages:   630
Publication Date:   05 August 2002
Audience:   College/higher education ,  Professional and scholarly ,  Undergraduate ,  Postgraduate, Research & Scholarly
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Block Ciphers.- Essential Algebraic Structure within the AES.- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC.- Tweakable Block Ciphers.- Multi-user Oriented Cryptosystems.- The LSD Broadcast Encryption Scheme.- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.- Foundations and Methodology.- Provably Secure Steganography.- Flaws in Applying Proof Methodologies to Signature Schemes.- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case.- Security of Practical Protocols.- On the Security of RSA Encryption in TLS.- Security Analysis of IKE's Signature-Based Key-Exchange Protocol.- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks.- Secure Multiparty Computation.- On 2-Round Secure Multiparty Computation.- Private Computation - k-Connected versus 1-Connected Networks.- Public-Key Encryption.- Analysis and Improvements of NTRU Encryption Paddings.- Universal Padding Schemes for RSA.- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent.- Information Theory and Secret Sharing.- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors.- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups.- Cipher Design and Analysis.- A Generalized Birthday Problem.- (Not So) Random Shuffles of RC4.- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.- Elliptic Curves and Abelian Varieties.- Supersingular Abelian Varieties in Cryptology.- Efficient Algorithms for Pairing-Based Cryptosystems.- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2.- Password-Based Authentication.- Threshold Password-Authenticated Key Exchange.- Distributed Cryptosystems.- A Threshold Pseudorandom Function Construction and Its Applications.- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products.- Pseudorandomness and Applications.- Hidden Number Problem with the Trace and Bit Security of XTR and LUC.- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security.- Variations on Signatures and Authentication.- Threshold Ring Signatures and Applications to Ad-hoc Groups.- Deniable Ring Authentication.- SiBIR: Signer-Base Intrusion-Resilient Signatures.- Stream Ciphers and Boolean Functions.- Cryptanalysis of Stream Ciphers with Linear Masking.- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers.- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction.- Commitment Schemes.- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks.- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor.- Signature Schemes.- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation.- Security Proof for Partial-Domain Hash Signature Schemes.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List