×
Loading...

Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings by International Conference on the Theory a...

Book Information

TitleAdvances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
CreatorInternational Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea), Lee, Pil Joong
Year2004
PPI300
PublisherBerlin : Springer
LanguageEnglish
Mediatypetexts
SubjectComputer security, Cryptography, Sécurité informatique, Cryptographie, Cryptographie (Informatique), Cryptography, Cryptographie (Informatique), Sécurité informatique
ISBN3540239758, 9783540239758
Collectionjournals_contributions, journals
Uploadersketch
Identifierspringer_10.1007-b104116
Telegram icon Share on Telegram
Download Now

Description

Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. ProceedingsAuthor: Pil Joong Lee Published by Springer Berlin Heidelberg ISBN: 978-3-540-23975-8 DOI: 10.1007/b104116Table of Contents:On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC Eliminating Random Permutation Oracles in the Even-Mansour Cipher Towards Plaintext-Aware Public-Key Encryption Without Random Oracles OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding Stream Ciphers: Dead or Alive? On the Generalized Linear Equivalence of Functions Over Finite Fields Sieving Using Bucket Sort Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups Practical Two-Party Computation Based on the Conditional Gate Privacy in Non-private Environments Asynchronous Proactive Cryptosystems Without Agreement Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes Masking Based Domain Extenders for UOWHFs: Bounds and Constructions Higher Order Universal One-Way Hash Functions The MD2 Hash Function Is Not One-Way New Approaches to Password Authenticated Key Exchange Based on RSA Constant-Round Authenticated Group Key Exchange for Dynamic Groups A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices, Includes bibliographical references and index