Coverart for item
The Resource Advances in Cryptology – EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, edited by Lars Knudsen, (electronic resource)

Advances in Cryptology – EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, edited by Lars Knudsen, (electronic resource)

Label
Advances in Cryptology – EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings
Title
Advances in Cryptology – EUROCRYPT 2002
Title remainder
International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings
Statement of responsibility
edited by Lars Knudsen
Creator
Contributor
Editor
Editor
Subject
Language
  • eng
  • eng
Member of
http://bibfra.me/vocab/relation/corporateauthor
TwuE85iRQuk
Dewey number
005.8
http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
likiRMKX118
Image bit depth
0
Language note
English
LC call number
QA76.9.D335
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2002
http://bibfra.me/vocab/lite/meetingName
EUROCRYPT (Conference)
Nature of contents
dictionaries
http://bibfra.me/vocab/lite/organizationName
EUROCRYPT
http://library.link/vocab/relatedWorkOrContributorName
  • EUROCRYPT
  • Knudsen, Lars.
Series statement
Lecture Notes in Computer Science,
Series volume
2332
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Coding theory
  • Computer software
  • Computational complexity
  • Information Systems
  • Computer Communication Networks
  • Cryptology
  • Coding and Information Theory
  • Algorithm Analysis and Problem Complexity
  • Discrete Mathematics in Computer Science
  • Management of Computing and Information Systems
  • Computer Communication Networks
Label
Advances in Cryptology – EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, edited by Lars Knudsen, (electronic resource)
Instantiates
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
cr
Color
not applicable
Content category
text
Content type code
txt
Contents
Cryptanalysis I -- Cryptanalysis of a Pseudorandom Generator Based on Braid Groups -- Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups -- Extending the GHS Weil Descent Attack -- Public-Key Encryption -- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption -- Key-Insulated Public Key Cryptosystems -- On the Security of Joint Signature and Encryption -- Invited Talk -- AES and the Wide Trail Design Strategy -- Information Theory & New Models -- Indistinguishability of Random Systems -- How to Fool an Unbounded Adversary with a Short Key -- Cryptography in an Unbounded Computational Model -- Implementational Analysis -- Performance Analysis and Parallel Implementation of Dedicated Hash Functions -- Fault Injection and a Timing Channel on an Analysis Technique -- Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms -- Stream Ciphers -- Fast Correlation Attacks: An Algorithmic Point of View -- BDD-Based Cryptanalysis of Keystream Generators -- Linear Cryptanalysis of Bluetooth Stream Cipher -- Digital Signatures I -- Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups -- Optimal Security Proofs for PSS and Other Signature Schemes -- Cryptanalysis II -- Cryptanalysis of SFLASH -- Cryptanalysis of the Revised NTRU Signature Scheme -- Key Exchange -- Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions -- Universally Composable Notions of Key Exchange and Secure Channels -- On Deniability in Quantum Key Exchange -- Modes of Operation -- A Practice-Oriented Treatment of Pseudorandom Number Generators -- A Block-Cipher Mode of Operation for Parallelizable Message Authentication -- Invited Talk -- Rethinking PKI: What’s Trust Got to Do with It? -- Digital Signatures II -- Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods -- From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security -- Security Notions for Unconditionally Secure Signature Schemes -- Traitor Tracking & Id-Based Encryption -- Traitor Tracing with Constant Transmission Rate -- Toward Hierarchical Identity-Based Encryption -- Multiparty and Multicast -- Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch -- Perfectly Secure Message Transmission Revisited -- Symmetric Cryptology -- Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis -- Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS..
Dimensions
unknown
Edition
1st ed. 2002.
Extent
1 online resource (XII, 552 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540460350
Level of compression
uncompressed
Media category
computer
Media type code
c
Other control number
10.1007/3-540-46035-7
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000211728
  • (SSID)ssj0000320941
  • (PQKBManifestationID)11262179
  • (PQKBTitleCode)TC0000320941
  • (PQKBWorkID)10258343
  • (PQKB)11021108
  • (DE-He213)978-3-540-46035-0
  • (MiAaPQ)EBC3072528
  • (EXLCZ)991000000000211728
Label
Advances in Cryptology – EUROCRYPT 2002 : International Conference on the Theory and Applications of Cryptographic Techniques, Amsterdam, The Netherlands, April 28 - May 2, 2002 Proceedings, edited by Lars Knudsen, (electronic resource)
Publication
Note
Bibliographic Level Mode of Issuance: Monograph
Antecedent source
mixed
Bibliography note
Includes bibliographical references at the end of each chapters and index
Carrier category
online resource
Carrier category code
cr
Color
not applicable
Content category
text
Content type code
txt
Contents
Cryptanalysis I -- Cryptanalysis of a Pseudorandom Generator Based on Braid Groups -- Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups -- Extending the GHS Weil Descent Attack -- Public-Key Encryption -- Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption -- Key-Insulated Public Key Cryptosystems -- On the Security of Joint Signature and Encryption -- Invited Talk -- AES and the Wide Trail Design Strategy -- Information Theory & New Models -- Indistinguishability of Random Systems -- How to Fool an Unbounded Adversary with a Short Key -- Cryptography in an Unbounded Computational Model -- Implementational Analysis -- Performance Analysis and Parallel Implementation of Dedicated Hash Functions -- Fault Injection and a Timing Channel on an Analysis Technique -- Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms -- Stream Ciphers -- Fast Correlation Attacks: An Algorithmic Point of View -- BDD-Based Cryptanalysis of Keystream Generators -- Linear Cryptanalysis of Bluetooth Stream Cipher -- Digital Signatures I -- Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups -- Optimal Security Proofs for PSS and Other Signature Schemes -- Cryptanalysis II -- Cryptanalysis of SFLASH -- Cryptanalysis of the Revised NTRU Signature Scheme -- Key Exchange -- Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions -- Universally Composable Notions of Key Exchange and Secure Channels -- On Deniability in Quantum Key Exchange -- Modes of Operation -- A Practice-Oriented Treatment of Pseudorandom Number Generators -- A Block-Cipher Mode of Operation for Parallelizable Message Authentication -- Invited Talk -- Rethinking PKI: What’s Trust Got to Do with It? -- Digital Signatures II -- Efficient Generic Forward-Secure Signatures with an Unbounded Number of Time Periods -- From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security -- Security Notions for Unconditionally Secure Signature Schemes -- Traitor Tracking & Id-Based Encryption -- Traitor Tracing with Constant Transmission Rate -- Toward Hierarchical Identity-Based Encryption -- Multiparty and Multicast -- Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch -- Perfectly Secure Message Transmission Revisited -- Symmetric Cryptology -- Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis -- Security Flaws Induced by CBC Padding — Applications to SSL, IPSEC, WTLS..
Dimensions
unknown
Edition
1st ed. 2002.
Extent
1 online resource (XII, 552 p.)
File format
multiple file formats
Form of item
online
Isbn
9783540460350
Level of compression
uncompressed
Media category
computer
Media type code
c
Other control number
10.1007/3-540-46035-7
Quality assurance targets
absent
Reformatting quality
access
Specific material designation
remote
System control number
  • (CKB)1000000000211728
  • (SSID)ssj0000320941
  • (PQKBManifestationID)11262179
  • (PQKBTitleCode)TC0000320941
  • (PQKBWorkID)10258343
  • (PQKB)11021108
  • (DE-He213)978-3-540-46035-0
  • (MiAaPQ)EBC3072528
  • (EXLCZ)991000000000211728

Library Locations

  • Architecture LibraryBorrow it
    Gould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US
    35.205706 -97.445050
  • Bizzell Memorial LibraryBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Boorstin CollectionBorrow it
    401 W. Brooks St., Norman, OK, 73019, US
    35.207487 -97.447906
  • Chinese Literature Translation ArchiveBorrow it
    401 W. Brooks St., RM 414, Norman, OK, 73019, US
    35.207487 -97.447906
  • Engineering LibraryBorrow it
    Felgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US
    35.205706 -97.445050
  • Fine Arts LibraryBorrow it
    Catlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US
    35.210371 -97.448244
  • Harry W. Bass Business History CollectionBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • History of Science CollectionsBorrow it
    401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • John and Mary Nichols Rare Books and Special CollectionsBorrow it
    401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US
    35.207487 -97.447906
  • Library Service CenterBorrow it
    2601 Technology Place, Norman, OK, 73019, US
    35.185561 -97.398361
  • Price College Digital LibraryBorrow it
    Adams Hall 102 307 West Brooks St., Norman, OK, 73019, US
    35.210371 -97.448244
  • Western History CollectionsBorrow it
    Monnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US
    35.209584 -97.445414
Processing Feedback ...