© 2001

Progress in Cryptology — INDOCRYPT 2001

Second International Conference on Cryptology in India Chennai, India, December 16–20, 2001 Proceedings

  • C. Pandu Rangan
  • Cunsheng Ding
Conference proceedings INDOCRYPT 2001

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2247)

Table of contents

  1. Front Matter
    Pages I-XIII
  2. Invited Lecture

  3. Hashing

    1. Minoru Kuribayashi, Hatsukazu Tanaka
      Pages 30-39
    2. Palash Sarkar, Paul J. Schellenberg
      Pages 40-49
    3. Bok-Min Goi, M. U. Siddiqi, Hean-Teik Chuah
      Pages 50-61
  4. Algebraic Schemes

    1. Kishan Chand Gupta, Subhamoy Maitra
      Pages 62-72
    2. Jae Moon Kim, Ikkwon Yie, Seung Ik Oh, Hyung Don Kim, Jado Ryu
      Pages 73-78
    3. Josef Pieprzyk, Xian-Mo Zhang
      Pages 79-90
  5. Elliptic Curves

  6. Coding Theory

    1. Palash Sarkar, Douglas R. Stinson
      Pages 117-126
    2. Rei Safavi-Naini, Huaxiong Wang, Chaoping Xing
      Pages 127-135
  7. Applications -I

    1. Steve Kremer, Olivier Markowitch
      Pages 136-148
    2. Subhamoy Maitra, Dipti Prasad Mukherjee
      Pages 149-161
    3. Byoungcheon Lee, Kwangjo Kim, Joongsoo Ma
      Pages 162-174
    4. Kapali Viswanathan, Colin Boyd, Ed Dawson
      Pages 175-187
  8. Cryptanalysis

About these proceedings


INDOCRYPT 2001, the Second Annual Crypto Conference, is proof of the s- ni?cant amount of enthusiasm generated among Indian as well as International crypto communities. INDOCRYPT 2001 was organized by the Indian Institute of Technology, Madras and the Institute of Mathematical Sciences, also located in Madras (now Chennai). This event was enthusiastically co-sponsored by eAl- traz ConsultingPrivate Ltd, Chennai, Odyssey Technologies Ltd, Chennai, and Shanmuga Arts Science Technology and Research Academy (SASTRA), Th- javur. The Program Committee Co-chair, Prof.C.Pandu Rangan was responsible for local organization and registration. The Program Committee considered 77 papers and selected 31 papers for presentation. These papers were selected on the basis of perceived originality, quality, and relevance to the ?eld of cryptography. The proceedings include the revised version of the accepted papers. Revisions were not checked as to their contents and authors bear full responsibility for the contents of their submissions. The selection of papers is a very challengingand demandingtask. We wish to thank the Program Committee members who did an excellent job in reviewing the submissions in spite of severe time constraints imposed by the tight p- cessingschedule. Each submission was reviewed by at least three referees (only a few by two). The Program Committee was ably assisted by a large number of reviewers in their area of expertise. The list of reviewers has been provided separately. Our thanks go to all of them.


Computational Algebraic Number Theory Cryptoanalyse Cryptographics Functions Cryptosysteme Data Encryption Digital Auctions Digital Signatures Information Security Public Key Cryptography algorithms coding theory complexity email finite field online

Editors and affiliations

  • C. Pandu Rangan
    • 1
  • Cunsheng Ding
    • 2
  1. 1.Department of Computer Science and EngineeringIndian Institute of Technology, MadrasChennaiIndia
  2. 2.Department of Computer ScienceHong Kong University of Science and TechnologyHong Kong

Bibliographic information