Advertisement

Progress in Cryptology - INDOCRYPT 2003

4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003. Proceedings

  • Thomas Johansson
  • Subhamoy Maitra

Part of the Lecture Notes in Computer Science book series (LNCS, volume 2904)

Table of contents

  1. Front Matter
  2. Invited Talks

    1. Xiang Li, Jennifer Seberry
      Pages 18-35
  3. Stream Cipher

  4. Block Cipher

    1. Jongsung Kim, Seokhie Hong, Jaechul Sung, Sangjin Lee, Jongin Lim, Soohak Sung
      Pages 82-96
    2. Seokhie Hong, Jongsung Kim, Guil Kim, Jaechul Sung, Changhoon Lee, Sangjin Lee
      Pages 97-106
  5. Boolean Function

  6. Secrect Sharing

    1. Ventzislav Nikov, Svetla Nikova, Bart Preneel
      Pages 135-147
    2. Avishek Adhikari, Somnath Sikdar
      Pages 148-161
    3. V. Vinod, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim
      Pages 162-176
  7. Bilinear Pairing

    1. Yi Mu, Willy Susilo, Yan-Xia Lin
      Pages 177-190
    2. Fangguo Zhang, Reihaneh Safavi-Naini, Willy Susilo
      Pages 191-204
    3. Rana Barua, Ratna Dutta, Palash Sarkar
      Pages 205-217
  8. Public Key

    1. P. J. Abisha, D. G. Thomas, K. G. Subramanian
      Pages 218-227
    2. Ikkwon Yie, Seongan Lim, Seungjoo Kim, Dongryeol Kim
      Pages 228-234
    3. Françoise Levy-dit-Vehel, Ludovic Perret
      Pages 235-251
  9. Signature Scheme

    1. Javier Herranz, Germán Sáez
      Pages 266-279
  10. Protocol

    1. Jordi Castellà-Roca, Josep Domingo-Ferrer, Andreu Riera, Joan Borrell
      Pages 280-294
    2. Supakorn Kungpisdan, Bala Srinivasan, Phu Dung Le
      Pages 295-308
  11. Elliptic Curve & Algebraic Geometry

    1. Elisavet Konstantinou, Yannis C. Stamatiou, Christos Zaroliagis
      Pages 309-322
    2. Farzali A. Izadi, V. Kumar Murty
      Pages 323-333
  12. Implementation & Digital Watermarking

  13. Authentication

    1. Duncan S. Wong, Agnes H. Chan, Feng Zhu
      Pages 375-387
    2. Yvonne Hitchcock, Yiu Shing Terry Tin, Juan Manuel Gonzalez-Nieto, Colin Boyd, Paul Montague
      Pages 388-401
    3. Tetsu Iwata, Kaoru Kurosawa
      Pages 402-415
  14. Back Matter

About these proceedings

Keywords

Boolean function authentication computational number theory cryptanalysis cryptographic protocols cryptography cryptology cryptosystems digital signatures finite field computations information security privacy public key cryptography secure communications

Editors and affiliations

  • Thomas Johansson
    • 1
  • Subhamoy Maitra
    • 2
  1. 1.Dept. of Electrical and Information TechnologyLund UniversityLundSweden
  2. 2.Indian Statistical InstituteKolkataIndia

Bibliographic information

  • DOI https://doi.org/10.1007/b94593
  • Copyright Information Springer-Verlag Berlin Heidelberg 2003
  • Publisher Name Springer, Berlin, Heidelberg
  • eBook Packages Springer Book Archive
  • Print ISBN 978-3-540-20609-5
  • Online ISBN 978-3-540-24582-7
  • Series Print ISSN 0302-9743
  • Series Online ISSN 1611-3349
  • Buy this book on publisher's site