Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource)
Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource)
Resource Information
The item Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Summary
- This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers
- Language
- eng
- Contents
-
- Hashing
- Linearization Attacks Against Syndrome Based Hashes
- A Meet-in-the-Middle Collision Attack Against the New FORK-256
- Multilane HMAC— Security beyond the Birthday Limit
- Elliptic Curve
- On the Bits of Elliptic Curve Diffie-Hellman Keys
- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography
- Cryptoanalysis
- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
- Related-Key Differential-Linear Attacks on Reduced AES-192
- Improved Meet-in-the-Middle Attacks on Reduced-Round DES
- Information Theoretic Security
- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
- Secret Swarm Unit Reactive k??Secret Sharing
- Elliptic Curve Cryptography
- New Formulae for Efficient Elliptic Curve Arithmetic
- A Graph Theoretic Analysis of Double Base Number Systems
- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
- Signature
- Transitive Signatures from Braid Groups
- Proxy Re-signature Schemes Without Random Oracles
- Side Channel Attack
- First-Order Differential Power Analysis on the Duplication Method
- Solving Discrete Logarithms from Partial Knowledge of the Key
- Symmetric Cryptosystem
- New Description of SMS4 by an Embedding overGF(28)
- Tweakable Enciphering Schemes from Hash-Sum-Expansion
- A Framework for Chosen IV Statistical Analysis of Stream Ciphers
- Asymmetric Cryptosystem
- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
- Short Presentation
- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues
- On the k-Operation Linear Complexity of Periodic Sequences
- Trade-Off Traitor Tracing
- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs
- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System
- Extended Multi-Property-Preserving and ECM-Construction
- Design of a Differential Power Analysis Resistant Masked AES S-Box
- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function
- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware
- Isbn
- 9783540770268
- Label
- Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings
- Title
- Progress in Cryptology – INDOCRYPT 2007
- Title remainder
- 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings
- Statement of responsibility
- edited by K. Srinathan, C. Pandu Rangan, Moti Yung
- Subject
-
- Computational complexity
- Computer Communication Networks
- Computer Science
- Computer science
- Computer software
- Data Encryption
- Data encryption (Computer science)
- Data protection
- Discrete Mathematics in Computer Science
- Electronic resources
- Information Systems
- Management of Computing and Information Systems
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 8th International Conference on Cryptology in India, INDOCRYPT 2007, held in Chennai, India, in December 2007. The 22 revised full papers and 11 revised short papers presented together with 3 invited lectures were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on hashing, elliptic curve, cryptoanalysis, information theoretic security, elliptic curve cryptography, signature, side channel attack, symmetric cryptosystem, asymmetric cryptosystem, and short papers
- http://library.link/vocab/creatorName
- Srinathan, K
- Image bit depth
- 0
- LC call number
- QA76.9.A25
- Literary form
- non fiction
- http://library.link/vocab/relatedWorkOrContributorName
-
- Rangan, C. Pandu.
- Yung, Moti.
- SpringerLink
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 4859
- http://library.link/vocab/subjectName
-
- Computer science
- Computer Communication Networks
- Data protection
- Data encryption (Computer science)
- Computer software
- Computational complexity
- Information Systems
- Computer Science
- Data Encryption
- Algorithm Analysis and Problem Complexity
- Discrete Mathematics in Computer Science
- Systems and Data Security
- Computer Communication Networks
- Management of Computing and Information Systems
- Label
- Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware
- Dimensions
- unknown
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540770268
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-540-77026-8
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-77026-8
- Label
- Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource)
- Antecedent source
- mixed
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Hashing -- Linearization Attacks Against Syndrome Based Hashes -- A Meet-in-the-Middle Collision Attack Against the New FORK-256 -- Multilane HMAC— Security beyond the Birthday Limit -- Elliptic Curve -- On the Bits of Elliptic Curve Diffie-Hellman Keys -- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography -- Cryptoanalysis -- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses -- Related-Key Differential-Linear Attacks on Reduced AES-192 -- Improved Meet-in-the-Middle Attacks on Reduced-Round DES -- Information Theoretic Security -- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality -- Secret Swarm Unit Reactive k??Secret Sharing -- Elliptic Curve Cryptography -- New Formulae for Efficient Elliptic Curve Arithmetic -- A Graph Theoretic Analysis of Double Base Number Systems -- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication -- Signature -- Transitive Signatures from Braid Groups -- Proxy Re-signature Schemes Without Random Oracles -- Side Channel Attack -- First-Order Differential Power Analysis on the Duplication Method -- Solving Discrete Logarithms from Partial Knowledge of the Key -- Symmetric Cryptosystem -- New Description of SMS4 by an Embedding overGF(28) -- Tweakable Enciphering Schemes from Hash-Sum-Expansion -- A Framework for Chosen IV Statistical Analysis of Stream Ciphers -- Asymmetric Cryptosystem -- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols -- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power -- Short Presentation -- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues -- On the k-Operation Linear Complexity of Periodic Sequences -- Trade-Off Traitor Tracing -- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs -- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System -- Extended Multi-Property-Preserving and ECM-Construction -- Design of a Differential Power Analysis Resistant Masked AES S-Box -- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks -- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions -- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function -- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware
- Dimensions
- unknown
- File format
- multiple file formats
- Form of item
- electronic
- Isbn
- 9783540770268
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-540-77026-8
- Other physical details
- online resource.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (DE-He213)978-3-540-77026-8
Subject
- Computational complexity
- Computer Communication Networks
- Computer Science
- Computer science
- Computer software
- Data Encryption
- Data encryption (Computer science)
- Data protection
- Discrete Mathematics in Computer Science
- Electronic resources
- Information Systems
- Management of Computing and Information Systems
- Systems and Data Security
- Algorithm Analysis and Problem Complexity
Member of
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Progress-in-Cryptology-%E2%80%93-INDOCRYPT-2007--8th/oQPlmtV2dLY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Progress-in-Cryptology-%E2%80%93-INDOCRYPT-2007--8th/oQPlmtV2dLY/">Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Progress-in-Cryptology-%E2%80%93-INDOCRYPT-2007--8th/oQPlmtV2dLY/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Progress-in-Cryptology-%E2%80%93-INDOCRYPT-2007--8th/oQPlmtV2dLY/">Progress in Cryptology – INDOCRYPT 2007 : 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007. Proceedings, edited by K. Srinathan, C. Pandu Rangan, Moti Yung, (electronic resource)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>