Sold Out
Book Categories |
Cryptanalysis of a Pseudorandom Generator Based on Braid Groups | 1 | |
Potential Weaknesses of the Commutator Key Agreement Protocol Based on Braid Groups | 14 | |
Extending the GHS Weil Descent Attack | 29 | |
Universal Hash Proofs and a Paradigm for Adaptive Chosen Ciphertext Secure Public-Key Encryption | 45 | |
Key-Insulated Public Key Cryptosystems | 65 | |
On the Security of Joint Signature and Encryption | 83 | |
AES and the Wild Trail Design Strategy | 108 | |
Indistinguishability of Random Systems | 110 | |
How to Fool an Unbounded Adversary with a Short Key | 133 | |
Cryptography in an Unbounded Computational Model | 149 | |
Performance Analysis and Parallel Implementation of Dedicated Hash Functions | 165 | |
Fault Injection and a Timing Channel on an Analysis Technique | 181 | |
Speeding Up Point Multiplication on Hyperelliptic Curves with Efficiently-Computable Endomorphisms | 197 | |
Fast Correlation Attacks: An Algorithmic Point of View | 209 | |
BDD-Based Cryptanalysis of Keystream Generators | 222 | |
Linear Cryptanalysis of Bluetooth Stream Cipher | 238 | |
Generic Lower Bounds for Root Extraction and Signature Schemes in General Groups | 256 | |
Optimal Security Proofs for PSS and Other Signature Schemes | 272 | |
Cryptanalysis of SFLASH | 288 | |
Cryptanalysis of the Revised NTRU Signature Scheme | 299 | |
Dynamic Group Diffie-Hellman Key Exchange under Standard Assumptions | 321 | |
Universally Composable Notions of Key Exchange and Secure Channels | 337 | |
On Deniability in Quantum Key Exchange | 352 | |
A Practice-Oriented Treatment of Pseudorandom Number Generators | 368 | |
A Block-Cipher Mode of Operation for Parallelizable Message Authentication | 384 | |
Rethinking PKI: What's Trust Got to Do with It? | 398 | |
Efficient Generic Forward-Secure Signatures with the Unbounded Number of Time Periods | 400 | |
From Identification to Signatures via the Fiat-Shamir Transform: Minimizing Assumptions for Security and Forward-Security | 418 | |
Security Notions for Unconditionally Secure Signature Schemes | 434 | |
Traitor Tracing with Constant Transmission Rate | 450 | |
Toward Hierarchical Identity-Based Encryption | 466 | |
Unconditional Byzantine Agreement and Multi-party Computation Secure against Dishonest Minorities from Scratch | 482 | |
Perfectly Secure Message Transmission Revisited | 502 | |
Degree of Composition of Highly Nonlinear Functions and Applications to Higher Order Differential Cryptanalysis | 518 | |
Security Flaws Induced by CBC Padding - Applications to SSL, IPSEC, WTLS | 534 | |
Author Index | 547 |
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionAdvances in Cryptology - EUROCRYPT 2002
X
This Item is in Your InventoryAdvances in Cryptology - EUROCRYPT 2002
X
You must be logged in to review the productsX
X
X
Add Advances in Cryptology - EUROCRYPT 2002, This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002. The 33 revised full papers presented were , Advances in Cryptology - EUROCRYPT 2002 to the inventory that you are selling on WonderClubX
X
Add Advances in Cryptology - EUROCRYPT 2002, This book constitutes the refereed proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT 2002, held in Amsterdam, The Netherlands, in April/May 2002. The 33 revised full papers presented were , Advances in Cryptology - EUROCRYPT 2002 to your collection on WonderClub |