Amazon cover image
Image from Amazon.com

Advances in Cryptology " CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA, August 19 23, 2001 Proceedings.

By: Kilian, JoeMaterial type: TextTextSeries: Serienbezeichnung | Lecture notes in computer science ; 2139,Publication details: Berlin ; Heidelberg : Springer-Verlag Berlin Heidelberg, 2001. Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540446477; 3540446478Subject(s): Computer security -- Congresses | Cryptography -- Congresses | Computer science | Operating systems (Computers) | Data encryption (Computer science) | Computer software | Computer science | Computer security | Computer software | Cryptography | Data encryption (Computer science) | Operating systems (Computers)Genre/Form: Electronic books. | Conference papers and proceedings. Additional physical formats: Printed edition:: No titleDDC classification: 005.82 LOC classification: QA76.9.A25Online resources: Click here to access online
Contents:
Foundations -- On the (Im)possibility of Obfuscating Programs -- Universally Composable Commitments -- Traitor Tracing -- Revocation and Tracing Schemes for Stateless Receivers -- Self Protecting Pirates and Black-Box Traitor Tracing -- Multi-party Computation -- Minimal Complete Primitives for Secure Multi-party Computation -- Robustness for Free in Unconditional Multi-party Computation -- Secure Distributed Linear Algebra in a Constant Number of Rounds -- Two-Party Computation -- Two-Party Generation of DSA Signatures -- Oblivious Transfer in the Bounded Storage Model -- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation -- Elliptic Curves -- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms -- On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 -- OAEP Reconsidered -- RSA-OAEP Is Secure under the RSA Assumption -- Simplified OAEP for the RSA and Rabin Functions -- Encryption and Authentication -- Online Ciphers and the Hash-CBC Construction -- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) -- Signature Schemes -- Forward-Secure Signatures with Optimal Signing and Verifying -- Improved Online/Offline Signature Schemes -- Protocols -- An Efficient Scheme for Proving a Shuffle -- An Identity Escrow Scheme with Appointed Verifiers -- Session-Key Generation Using Human Passwords Only -- Cryptanalysis -- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding -- Correlation Analysis of the Shrinking Generator -- Applications of Groups and Codes -- Nonlinear Vector Resilient Functions -- New Public Key Cryptosystem Using Finite Non Abelian Groups -- Pseudorandomness from Braid Groups -- Broadcast and Secret Sharing -- On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase -- Secure and Efficient Asynchronous Broadcast Protocols -- Soundness and Zero-Knowledge -- Soundness in the Public-Key Model -- Robust Non-interactive Zero Knowledge.
Summary: This book constitutes the refereed proceedings of the 21st Annual International Cryptology Conference, CRYPTO 2001, held in Santa Barbara, CA, USA in August 2001. The 33 revised full papers presented were carefully reviewed and selected from a total of 156 submissions. The papers are organized in topical sections on foundations, traitor tracing, multi-party computation, two-party computation, elliptic curves, OAEP, encryption and authentication, signature schemes, protocols, cryptanalysis, applications of group theory and coding theory, broadcast and secret sharing, and soundness and zero-knowledge.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Status Date due Barcode Item holds
eBook eBook e-Library

Electronic Book@IST

EBook Available
Total holds: 0

This book constitutes the refereed proceedings of the 21st Annual International Cryptology Conference, CRYPTO 2001, held in Santa Barbara, CA, USA in August 2001. The 33 revised full papers presented were carefully reviewed and selected from a total of 156 submissions. The papers are organized in topical sections on foundations, traitor tracing, multi-party computation, two-party computation, elliptic curves, OAEP, encryption and authentication, signature schemes, protocols, cryptanalysis, applications of group theory and coding theory, broadcast and secret sharing, and soundness and zero-knowledge.

Foundations -- On the (Im)possibility of Obfuscating Programs -- Universally Composable Commitments -- Traitor Tracing -- Revocation and Tracing Schemes for Stateless Receivers -- Self Protecting Pirates and Black-Box Traitor Tracing -- Multi-party Computation -- Minimal Complete Primitives for Secure Multi-party Computation -- Robustness for Free in Unconditional Multi-party Computation -- Secure Distributed Linear Algebra in a Constant Number of Rounds -- Two-Party Computation -- Two-Party Generation of DSA Signatures -- Oblivious Transfer in the Bounded Storage Model -- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation -- Elliptic Curves -- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms -- On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme -- Identity-Based Encryption from the Weil Pairing -- OAEP -- A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 -- OAEP Reconsidered -- RSA-OAEP Is Secure under the RSA Assumption -- Simplified OAEP for the RSA and Rabin Functions -- Encryption and Authentication -- Online Ciphers and the Hash-CBC Construction -- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) -- Signature Schemes -- Forward-Secure Signatures with Optimal Signing and Verifying -- Improved Online/Offline Signature Schemes -- Protocols -- An Efficient Scheme for Proving a Shuffle -- An Identity Escrow Scheme with Appointed Verifiers -- Session-Key Generation Using Human Passwords Only -- Cryptanalysis -- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding -- Correlation Analysis of the Shrinking Generator -- Applications of Groups and Codes -- Nonlinear Vector Resilient Functions -- New Public Key Cryptosystem Using Finite Non Abelian Groups -- Pseudorandomness from Braid Groups -- Broadcast and Secret Sharing -- On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase -- Secure and Efficient Asynchronous Broadcast Protocols -- Soundness and Zero-Knowledge -- Soundness in the Public-Key Model -- Robust Non-interactive Zero Knowledge.

Powered by Koha