Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Crypto | International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea), Lee, Pil Joong
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Crypto
Author: International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea), Lee, Pil Joong
Added by: sketch
Added Date: 2015-12-29
Publication Date: 2004
Language: eng
Subjects: Computer security, Cryptography, Sécurité informatique, Cryptographie, Cryptographie (Informatique), Cryptography, Cryptographie (Informatique), Sécurité informatique
Publishers: Berlin : Springer
Collections: journals contributions, journals
ISBN Number: 3540239758, 9783540239758
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 291.39 MB
PDF Size: 4.96 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 471
Views: 521
Total Files: 18
Media Type: texts
Description
Author: Pil Joong Lee
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23975-8
DOI: 10.1007/b104116
Table of Contents:
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Eliminating Random Permutation Oracles in the Even-Mansour Cipher
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- Stream Ciphers: Dead or Alive?
- On the Generalized Linear Equivalence of Functions Over Finite Fields
- Sieving Using Bucket Sort
- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups
- Practical Two-Party Computation Based on the Conditional Gate
- Privacy in Non-private Environments
- Asynchronous Proactive Cryptosystems Without Agreement
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
- Higher Order Universal One-Way Hash Functions
- The MD2 Hash Function Is Not One-Way
- New Approaches to Password Authenticated Key Exchange Based on RSA
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
Includes bibliographical references and index