Sold Out
Book Categories |
On the (Im)possibility of Obfuscating Programs | 1 | |
Universally Composable Commitments | 19 | |
Revocation and Tracing Schemes for Stateless Receivers | 41 | |
Self Protecting Pirates and Black-Box Traitor Tracing | 63 | |
Minimal Complete Primitives for Secure Multi-party Computation | 80 | |
Robustness for Free in Unconditional Multi-party Computation | 101 | |
Secure Distributed Linear Algebra in a Constant Number of Rounds | 119 | |
Two-Party Generation of DSA Signatures | 137 | |
Oblivious Transfer in the Bounded Storage Model | 155 | |
Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation | 171 | |
Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms | 190 | |
On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme | 201 | |
Identity-Based Encryption from the Weil Pairing | 213 | |
A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0 | 230 | |
OAEP Reconsidered | 239 | |
RSA-OAEP Is Secure under the RSA Assumption | 260 | |
Simplified OAEP for the RSA and Rabin Functions | 275 | |
Online Ciphers and the Hash-CBC Construction | 292 | |
The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?) | 310 | |
Forward-Secure Signature with Optimal Signing and Verifying | 332 | |
Improved Online/Offline Signature Schemes | 355 | |
An Efficient Scheme for Proving a Shuffle | 368 | |
An Identity Escrow Scheme with Appointed Verifiers | 388 | |
Session-Key Generation Using Human Passwords Only | 408 | |
Cryptanalysis of RSA Signatures with Fixed-Pattern Padding | 433 | |
Correlation Analysis of the Shrinking Generator | 440 | |
Nonlinear Vector Resilient Functions | 458 | |
New Public Key Cryptosystem Using Finite Non Abelian Groups | 470 | |
Pseudorandomness from Brain Groups | 486 | |
On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase | 503 | |
Secure and Efficient Asynchronous Broadcast Protocols | 524 | |
Soundness in the Public-Key Model | 542 | |
Robust Non-interactive Zero Knowledge | 566 | |
Author Index | 599 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionAdvances in Cryptology - CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA. 19-22, 2001
X
This Item is in Your InventoryAdvances in Cryptology - CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA. 19-22, 2001
X
You must be logged in to review the productsX
X
X
Add Advances in Cryptology - CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA. 19-22, 2001, This book constitutes the refereed proceedings of the 21st Annual International Cryptology Conference, CRYPTO 2001, held in Santa Barbara, CA, USA in August 2001. The 33 revised full papers presented were carefully reviewed and selected from a total , Advances in Cryptology - CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA. 19-22, 2001 to the inventory that you are selling on WonderClubX
X
Add Advances in Cryptology - CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA. 19-22, 2001, This book constitutes the refereed proceedings of the 21st Annual International Cryptology Conference, CRYPTO 2001, held in Santa Barbara, CA, USA in August 2001. The 33 revised full papers presented were carefully reviewed and selected from a total , Advances in Cryptology - CRYPTO 2001 : 21st Annual International Cryptology Conference, Santa Barbara, California, USA. 19-22, 2001 to your collection on WonderClub |