Wonder Club world wonders pyramid logo
×

Advances in Cryptology - ASIACRYPT 2002 Book

Advances in Cryptology - ASIACRYPT 2002
Advances in Cryptology - ASIACRYPT 2002, This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together, Advances in Cryptology - ASIACRYPT 2002 has a rating of 3 stars
   2 Ratings
X
Advances in Cryptology - ASIACRYPT 2002, This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together, Advances in Cryptology - ASIACRYPT 2002
3 out of 5 stars based on 2 reviews
5
0 %
4
0 %
3
100 %
2
0 %
1
0 %
Digital Copy
PDF format
1 available   for $102.77
Original Magazine
Physical Format

Sold Out

  • Advances in Cryptology - ASIACRYPT 2002
  • Written by author Yuliang Zheng
  • Published by Springer-Verlag New York, LLC, January 2008
  • This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together
  • This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.The 34 revised full papers presented together
Buy Digital  USD$102.77

WonderClub View Cart Button

WonderClub Add to Inventory Button
WonderClub Add to Wishlist Button
WonderClub Add to Collection Button

Book Categories

Authors

Analysis of Bernstein's Factorization Circuit1
A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order27
Looking beyond XTR46
Bounds for Robust Metering Schemes and Their Relationship with A[superscript 2]-code64
Unconditionally Secure Anonymous Encryption and Group Authentication81
Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model100
On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives110
A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order125
Efficient Oblivious Transfer in the Bounded-Storage Model143
In How Many Ways Can You Write Rijndael?160
On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis176
Threshold Cryptosystems Based on Factoring192
Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments206
Asynchronous Secure Communication Tolerating Mixed Adversaries224
Amplified Boomerang Attack against Reduced-Round SHACAL243
Enhancing Differential-Linear Cryptanalysis254
Cryptanalysis of Block Ciphers with Overdefined Systems of Equations267
Analysis of Neural Cryptography288
The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm299
A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2311
A General Formula of the (t,n)-Threshold Visual Secret Sharing Scheme328
On Unconditionally Secure Robust Distributed Key Distribution Centers346
Short Signatures in the Random Oracle Model364
The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes379
Transitive Signatures Based on Factoring and RSA397
1-out-of-n Signatures from a Variety of Keys415
A Revocation Scheme with Minimal Storage at Receivers433
Optimistic Mixing for Exit-Polls451
Improved Construction of Nonlinear Resilient S-Boxes466
An Upper Bound on the Number of m-Resilient Boolean Functions484
Group Diffie-Hellman Key Exchange Secure Against Dictionary Attacks497
Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization515
ID-Based Blind Signature and Ring Signature from Pairings533
Hierarchical ID-Based Cryptography548
Crypto-integrity567
Gummy and Conductive Silicone Rubber Fingers574
Author Index575


Login

  |  

Complaints

  |  

Blog

  |  

Games

  |  

Digital Media

  |  

Souls

  |  

Obituary

  |  

Contact Us

  |  

FAQ

CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!!

X
WonderClub Home

This item is in your Wish List

Advances in Cryptology - ASIACRYPT 2002, This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together, Advances in Cryptology - ASIACRYPT 2002

X
WonderClub Home

This item is in your Collection

Advances in Cryptology - ASIACRYPT 2002, This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together, Advances in Cryptology - ASIACRYPT 2002

Advances in Cryptology - ASIACRYPT 2002

X
WonderClub Home

This Item is in Your Inventory

Advances in Cryptology - ASIACRYPT 2002, This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002.
The 34 revised full papers presented together, Advances in Cryptology - ASIACRYPT 2002

Advances in Cryptology - ASIACRYPT 2002

WonderClub Home

You must be logged in to review the products

E-mail address:

Password: