Borrow it
 African Studies Library
 Alumni Medical Library
 Astronomy Library
 Fineman and Pappas Law Libraries
 Frederick S. Pardee Management Library
 Howard Gotlieb Archival Research Center
 Mugar Memorial Library
 Music Library
 Pikering Educational Resources Library
 School of Theology Library
 Science & Engineering Library
 Stone Science Library
The Resource Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource)
Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource)
Resource Information
The item Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
 Summary
 This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2003, held in Warsaw, Poland in May 2003. The 37 revised full papers presented together with two invited papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on cryptanalysis, secure multiparty communication, zeroknowledge protocols, foundations and complexitytheoretic security, public key encryption, new primitives, elliptic curve cryptography, digital signatures, informationtheoretic cryptography, and group signatures
 Language
 eng
 Extent
 XIV, 654 p.
 Contents

 Cryptanalysis I
 Cryptanalysis of the EMD Mode of Operation
 On the Optimality of Linear, Differential, and Sequential Distinguishers
 A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms
 Secure Multiparty Computation I
 TwoThreshold Broadcast and Detectable Multiparty Computation
 On the Limitations of Universally Composable TwoParty Computation without Setup Assumptions
 Fair Secure TwoParty Computation
 Invited Talk I
 Facts and Myths of Enigma: Breaking Stereotypes
 ZeroKnowledge Protocols
 Resettable ZeroKnowledge in the Weak PublicKey Model
 Simulatable Commitments and Efficient Concurrent ZeroKnowledge
 Simulation in QuasiPolynomial Time, and Its Application to Protocol Composition
 Strengthening ZeroKnowledge Protocols Using Signatures
 Foundations and Complexity Theoretic Security
 Nearly OneSided Tests and the GoldreichLevin Predicate
 Efficient and Nonmalleable Proofs of Plaintext Knowledge and Applications
 Public Key Encryption
 A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem
 A Simpler Construction of CCA2Secure PublicKey Encryption under General Assumptions
 A ForwardSecure PublicKey Encryption Scheme
 CertificateBased Encryption and the Certificate Revocation Problem
 New Primitives
 CAPTCHA: Using Hard AI Problems for Security
 Concealment and Its Applications to Authenticated Encryption
 Cryptanalysis II
 Predicting the Shrinking Generator with Fixed Connections
 Algebraic Attacks on Stream Ciphers with Linear Feedback
 Elliptic Curves Cryptography
 Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time
 The GHS Attack Revisited
 Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms
 Digital Signatures
 A Signature Scheme as Secure as the DiffieHellman Problem
 Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
 Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures
 Invited Talk II
 Why Provable Security Matters?
 Cryptanalysis III
 On the Security of RDSA
 Cryptanalysis of the PublicKey Encryption Based on Braid Groups
 A Theoretical Treatment of RelatedKey Attacks: RKAPRPs, RKAPRFs, and Applications
 Key Exchange
 Provably Secure Threshold PasswordAuthenticated Key Exchange
 A Framework for PasswordBased Authenticated Key Exchange
 Information Theoretic Cryptography
 The Security of ManyRound LubyRackoff PseudoRandom Permutations
 New Bounds in SecretKey Agreement: The Gap between Formation and Secrecy Extraction
 Secure Multiparty Computation II
 Round Efficiency of Multiparty Computation with a Dishonest Majority
 Efficient Multiparty Computation over Rings
 Group Signatures
 Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions
 Extracting Group Signatures from Traitor Tracing Schemes
 Isbn
 9783540392002
 Label
 Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings
 Title
 Advances in Cryptology — EUROCRYPT 2003
 Title remainder
 International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings
 Statement of responsibility
 edited by Eli Biham
 Subject

 Computational complexity
 Information Systems
 Computer science
 Computer science
 Computer software
 Algorithm Analysis and Problem Complexity
 Operating systems (Computers)
 Operating systems (Computers)
 Computational complexity
 Management of Computing and Information Systems
 Computer Science
 Operating Systems
 Computer Science
 Discrete Mathematics in Computer Science
 Operating systems (Computers)
 Electronic resources
 Computational complexity
 Data encryption (Computer science)
 Computer software
 Computer software
 Computer Communication Networks
 Data encryption (Computer science)
 Computer Science
 Computer science
 Data Encryption
 Data encryption (Computer science)
 Language
 eng
 Summary
 This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2003, held in Warsaw, Poland in May 2003. The 37 revised full papers presented together with two invited papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on cryptanalysis, secure multiparty communication, zeroknowledge protocols, foundations and complexitytheoretic security, public key encryption, new primitives, elliptic curve cryptography, digital signatures, informationtheoretic cryptography, and group signatures
 http://library.link/vocab/creatorName
 Biham, Eli
 Image bit depth
 0
 LC call number
 QA76.9.A25
 Literary form
 non fiction
 http://library.link/vocab/relatedWorkOrContributorName
 SpringerLink
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 2656
 http://library.link/vocab/subjectName

 Computer science
 Computer Communication Networks
 Operating systems (Computers)
 Data encryption (Computer science)
 Computer software
 Computational complexity
 Information Systems
 Computer Science
 Data Encryption
 Computer Communication Networks
 Operating Systems
 Algorithm Analysis and Problem Complexity
 Discrete Mathematics in Computer Science
 Management of Computing and Information Systems
 Label
 Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Cryptanalysis I  Cryptanalysis of the EMD Mode of Operation  On the Optimality of Linear, Differential, and Sequential Distinguishers  A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms  Secure Multiparty Computation I  TwoThreshold Broadcast and Detectable Multiparty Computation  On the Limitations of Universally Composable TwoParty Computation without Setup Assumptions  Fair Secure TwoParty Computation  Invited Talk I  Facts and Myths of Enigma: Breaking Stereotypes  ZeroKnowledge Protocols  Resettable ZeroKnowledge in the Weak PublicKey Model  Simulatable Commitments and Efficient Concurrent ZeroKnowledge  Simulation in QuasiPolynomial Time, and Its Application to Protocol Composition  Strengthening ZeroKnowledge Protocols Using Signatures  Foundations and Complexity Theoretic Security  Nearly OneSided Tests and the GoldreichLevin Predicate  Efficient and Nonmalleable Proofs of Plaintext Knowledge and Applications  Public Key Encryption  A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem  A Simpler Construction of CCA2Secure PublicKey Encryption under General Assumptions  A ForwardSecure PublicKey Encryption Scheme  CertificateBased Encryption and the Certificate Revocation Problem  New Primitives  CAPTCHA: Using Hard AI Problems for Security  Concealment and Its Applications to Authenticated Encryption  Cryptanalysis II  Predicting the Shrinking Generator with Fixed Connections  Algebraic Attacks on Stream Ciphers with Linear Feedback  Elliptic Curves Cryptography  Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time  The GHS Attack Revisited  Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms  Digital Signatures  A Signature Scheme as Secure as the DiffieHellman Problem  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps  Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures  Invited Talk II  Why Provable Security Matters?  Cryptanalysis III  On the Security of RDSA  Cryptanalysis of the PublicKey Encryption Based on Braid Groups  A Theoretical Treatment of RelatedKey Attacks: RKAPRPs, RKAPRFs, and Applications  Key Exchange  Provably Secure Threshold PasswordAuthenticated Key Exchange  A Framework for PasswordBased Authenticated Key Exchange  Information Theoretic Cryptography  The Security of ManyRound LubyRackoff PseudoRandom Permutations  New Bounds in SecretKey Agreement: The Gap between Formation and Secrecy Extraction  Secure Multiparty Computation II  Round Efficiency of Multiparty Computation with a Dishonest Majority  Efficient Multiparty Computation over Rings  Group Signatures  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions  Extracting Group Signatures from Traitor Tracing Schemes
 Dimensions
 unknown
 Extent
 XIV, 654 p.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540392002
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/3540392009
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540392002
 Label
 Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource)
 Antecedent source
 mixed
 Carrier category
 online resource
 Carrier category code
 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Content type MARC source
 rdacontent
 Contents
 Cryptanalysis I  Cryptanalysis of the EMD Mode of Operation  On the Optimality of Linear, Differential, and Sequential Distinguishers  A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms  Secure Multiparty Computation I  TwoThreshold Broadcast and Detectable Multiparty Computation  On the Limitations of Universally Composable TwoParty Computation without Setup Assumptions  Fair Secure TwoParty Computation  Invited Talk I  Facts and Myths of Enigma: Breaking Stereotypes  ZeroKnowledge Protocols  Resettable ZeroKnowledge in the Weak PublicKey Model  Simulatable Commitments and Efficient Concurrent ZeroKnowledge  Simulation in QuasiPolynomial Time, and Its Application to Protocol Composition  Strengthening ZeroKnowledge Protocols Using Signatures  Foundations and Complexity Theoretic Security  Nearly OneSided Tests and the GoldreichLevin Predicate  Efficient and Nonmalleable Proofs of Plaintext Knowledge and Applications  Public Key Encryption  A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem  A Simpler Construction of CCA2Secure PublicKey Encryption under General Assumptions  A ForwardSecure PublicKey Encryption Scheme  CertificateBased Encryption and the Certificate Revocation Problem  New Primitives  CAPTCHA: Using Hard AI Problems for Security  Concealment and Its Applications to Authenticated Encryption  Cryptanalysis II  Predicting the Shrinking Generator with Fixed Connections  Algebraic Attacks on Stream Ciphers with Linear Feedback  Elliptic Curves Cryptography  Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time  The GHS Attack Revisited  Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms  Digital Signatures  A Signature Scheme as Secure as the DiffieHellman Problem  Aggregate and Verifiably Encrypted Signatures from Bilinear Maps  Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures  Invited Talk II  Why Provable Security Matters?  Cryptanalysis III  On the Security of RDSA  Cryptanalysis of the PublicKey Encryption Based on Braid Groups  A Theoretical Treatment of RelatedKey Attacks: RKAPRPs, RKAPRFs, and Applications  Key Exchange  Provably Secure Threshold PasswordAuthenticated Key Exchange  A Framework for PasswordBased Authenticated Key Exchange  Information Theoretic Cryptography  The Security of ManyRound LubyRackoff PseudoRandom Permutations  New Bounds in SecretKey Agreement: The Gap between Formation and Secrecy Extraction  Secure Multiparty Computation II  Round Efficiency of Multiparty Computation with a Dishonest Majority  Efficient Multiparty Computation over Rings  Group Signatures  Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions  Extracting Group Signatures from Traitor Tracing Schemes
 Dimensions
 unknown
 Extent
 XIV, 654 p.
 File format
 multiple file formats
 Form of item
 electronic
 Isbn
 9783540392002
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code
 c
 Other control number
 10.1007/3540392009
 Other physical details
 online resource.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (DEHe213)9783540392002
Subject
 Algorithm Analysis and Problem Complexity
 Computational complexity
 Computational complexity
 Computational complexity
 Computer Communication Networks
 Computer Science
 Computer Science
 Computer Science
 Computer science
 Computer science
 Computer science
 Computer software
 Computer software
 Computer software
 Data Encryption
 Data encryption (Computer science)
 Data encryption (Computer science)
 Data encryption (Computer science)
 Discrete Mathematics in Computer Science
 Electronic resources
 Information Systems
 Management of Computing and Information Systems
 Operating Systems
 Operating systems (Computers)
 Operating systems (Computers)
 Operating systems (Computers)
Member of
Library Locations

African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 71.108227


Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 71.105717

Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 71.107023

Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 71.099547

Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 71.108227


Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 71.108227

Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 71.101425

School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 71.107235

Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 71.102257

Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT2003/xvBvw3a5s78/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT2003/xvBvw3a5s78/">Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT2003/xvBvw3a5s78/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/AdvancesinCryptology%E2%80%94EUROCRYPT2003/xvBvw3a5s78/">Advances in Cryptology — EUROCRYPT 2003 : International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4–8, 2003 Proceedings, edited by Eli Biham, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>