Borrow it
- African Studies Library
- Alumni Medical Library
- Astronomy Library
- Fineman and Pappas Law Libraries
- Frederick S. Pardee Management Library
- Howard Gotlieb Archival Research Center
- Mugar Memorial Library
- Music Library
- Pikering Educational Resources Library
- School of Theology Library
- Science & Engineering Library
- Stone Science Library
The Resource Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.)
Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.)
Resource Information
The item Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.This item is available to borrow from all library branches.
Resource Information
The item Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in Boston University Libraries.
This item is available to borrow from all library branches.
- Extent
- x, 309 pages
- Contents
-
- On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski, Jr.
- Observability Analysis
- Detecting When Improved Cryptosystems Fail / Marc Joye, Jean-Jacques Quisquater and Sung-Ming Yen / [et al.]
- Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli / Colin D. Walter
- Montgomery in Practice: How to Do It More Efficiently in Hardware / Lejla Batina and Geeke Muurling
- MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis / Colin D. Walter
- An ASIC Implementation of the AES SBoxes / Johannes Wolkerstorfer, Elisabeth Oswald and Mario Lamberger
- On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function / Marc Fischlin
- The Representation Problem Based on Factoring / Marc Fischlin and Roger Fischlin
- Ciphers with Arbitrary Finite Domains / John Black and Phillip Rogaway
- Known Plaintext Correlation Attack against RC5 / Atsuko Miyaji, Masao Nonaka and Yoshinori Takii
- Micropayments Revisited / Silvio Micali and Ronald L. Rivest
- Proprietary Certificates / Markus Jakobsson, Ari Juels and Phong Q. Nguyen
- Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption / Giuseppe Ateniese and Cristina Nita-Rotaru
- RSA-Based Undeniable Signatures for General Moduli / Steven D. Galbraith, Wenbo Mao and Kenneth G. Paterson
- Co-operatively Formed Group Signatures / Greg Maitland and Colin Boyd
- Transitive Signature Schemes / Silvio Micali and Ronald L. Rivest
- Homomorphic Signature Schemes / Robert Johnson, David Molnar and Dawn Song / [et al.]
- GEM: A Generic Chosen-Ciphertext Secure Encryption Method / Jean-Sebastien Coron, Helena Handschuh and Marc Joye / [et al.]
- Securing "Encryption + Proof of Knowledge" in the Random Oracle Model / Masayuki Abe
- Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture / Qi Cheng and Shigenori Uchiyama
- Secure Key-Evolving Protocols for Discrete Logarithm Schemes / Cheng-Fen Lu and Shiuh Pyng Winston Shieh
- Isbn
- 9783540432241
- Label
- Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings
- Title
- Topics in cryptology, CT-RSA 2002
- Title remainder
- the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings
- Statement of responsibility
- Bart Preneel (ed.)
- Title variation
- CT-RSA 2002
- Subject
-
- Computer security -- Congresses
- Conference papers and proceedings
- Cryptographie -- Congrès
- Cryptographie -- Congrès
- Cryptography
- Cryptography -- Congresses
- Systèmes informatiques -- Mesures de sûreté | Congrès
- Sécurité informatique -- Congrès
- authentification
- authentification
- cT-RSA
- clé publique
- clé publique
- commerce électronique
- commerce électronique
- contrôle accès
- contrôle accès
- cryptographers track
- cryptographie
- cryptographie
- cryptology
- rSA
- signature numérique
- signature numérique
- sécurité communication
- sécurité communication
- sécurité donnée
- sécurité donnée
- sécurité information
- sécurité information
- théorie nombre
- théorie nombre
- Computer security
- Language
- eng
- Cataloging source
- UKM
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- R753 2002
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2002
- http://bibfra.me/vocab/lite/meetingName
- Cryptographers' Track at RSA Conference
- Nature of contents
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1963-
- http://library.link/vocab/relatedWorkOrContributorName
- Preneel, Bart
- http://library.link/vocab/subjectName
-
- Computer security
- Cryptography
- Sécurité informatique
- Cryptographie
- Computer security
- Cryptography
- signature numérique
- commerce électronique
- contrôle accès
- authentification
- théorie nombre
- sécurité communication
- sécurité donnée
- sécurité information
- clé publique
- cryptographie
- Cryptographie
- Systèmes informatiques
- signature numérique
- commerce électronique
- contrôle accès
- authentification
- théorie nombre
- sécurité communication
- sécurité donnée
- sécurité information
- clé publique
- cryptographie
- Label
- Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski, Jr. -- Observability Analysis -- Detecting When Improved Cryptosystems Fail / Marc Joye, Jean-Jacques Quisquater and Sung-Ming Yen / [et al.] -- Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli / Colin D. Walter -- Montgomery in Practice: How to Do It More Efficiently in Hardware / Lejla Batina and Geeke Muurling -- MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis / Colin D. Walter -- An ASIC Implementation of the AES SBoxes / Johannes Wolkerstorfer, Elisabeth Oswald and Mario Lamberger -- On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function / Marc Fischlin -- The Representation Problem Based on Factoring / Marc Fischlin and Roger Fischlin -- Ciphers with Arbitrary Finite Domains / John Black and Phillip Rogaway -- Known Plaintext Correlation Attack against RC5 / Atsuko Miyaji, Masao Nonaka and Yoshinori Takii -- Micropayments Revisited / Silvio Micali and Ronald L. Rivest -- Proprietary Certificates / Markus Jakobsson, Ari Juels and Phong Q. Nguyen -- Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption / Giuseppe Ateniese and Cristina Nita-Rotaru -- RSA-Based Undeniable Signatures for General Moduli / Steven D. Galbraith, Wenbo Mao and Kenneth G. Paterson -- Co-operatively Formed Group Signatures / Greg Maitland and Colin Boyd -- Transitive Signature Schemes / Silvio Micali and Ronald L. Rivest -- Homomorphic Signature Schemes / Robert Johnson, David Molnar and Dawn Song / [et al.] -- GEM: A Generic Chosen-Ciphertext Secure Encryption Method / Jean-Sebastien Coron, Helena Handschuh and Marc Joye / [et al.] -- Securing "Encryption + Proof of Knowledge" in the Random Oracle Model / Masayuki Abe -- Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture / Qi Cheng and Shigenori Uchiyama -- Secure Key-Evolving Protocols for Discrete Logarithm Schemes / Cheng-Fen Lu and Shiuh Pyng Winston Shieh
- Dimensions
- 24 cm.
- Dimensions
- unknown
- Extent
- x, 309 pages
- Isbn
- 9783540432241
- Lccn
- 2002283607
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- Specific material designation
- remote
- System control number
-
- (OCoLC)49238392
- (OCoLC)ocm49238392
- Label
- Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- volume
- Carrier category code
-
- nc
- Carrier MARC source
- rdacarrier
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- On Hash Function Firewalls in Signature Schemes / Burton S. Kaliski, Jr. -- Observability Analysis -- Detecting When Improved Cryptosystems Fail / Marc Joye, Jean-Jacques Quisquater and Sung-Ming Yen / [et al.] -- Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli / Colin D. Walter -- Montgomery in Practice: How to Do It More Efficiently in Hardware / Lejla Batina and Geeke Muurling -- MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis / Colin D. Walter -- An ASIC Implementation of the AES SBoxes / Johannes Wolkerstorfer, Elisabeth Oswald and Mario Lamberger -- On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function / Marc Fischlin -- The Representation Problem Based on Factoring / Marc Fischlin and Roger Fischlin -- Ciphers with Arbitrary Finite Domains / John Black and Phillip Rogaway -- Known Plaintext Correlation Attack against RC5 / Atsuko Miyaji, Masao Nonaka and Yoshinori Takii -- Micropayments Revisited / Silvio Micali and Ronald L. Rivest -- Proprietary Certificates / Markus Jakobsson, Ari Juels and Phong Q. Nguyen -- Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption / Giuseppe Ateniese and Cristina Nita-Rotaru -- RSA-Based Undeniable Signatures for General Moduli / Steven D. Galbraith, Wenbo Mao and Kenneth G. Paterson -- Co-operatively Formed Group Signatures / Greg Maitland and Colin Boyd -- Transitive Signature Schemes / Silvio Micali and Ronald L. Rivest -- Homomorphic Signature Schemes / Robert Johnson, David Molnar and Dawn Song / [et al.] -- GEM: A Generic Chosen-Ciphertext Secure Encryption Method / Jean-Sebastien Coron, Helena Handschuh and Marc Joye / [et al.] -- Securing "Encryption + Proof of Knowledge" in the Random Oracle Model / Masayuki Abe -- Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture / Qi Cheng and Shigenori Uchiyama -- Secure Key-Evolving Protocols for Discrete Logarithm Schemes / Cheng-Fen Lu and Shiuh Pyng Winston Shieh
- Dimensions
- 24 cm.
- Dimensions
- unknown
- Extent
- x, 309 pages
- Isbn
- 9783540432241
- Lccn
- 2002283607
- Media category
- unmediated
- Media MARC source
- rdamedia
- Media type code
-
- n
- Other physical details
- illustrations
- Specific material designation
- remote
- System control number
-
- (OCoLC)49238392
- (OCoLC)ocm49238392
Subject
- Computer security -- Congresses
- Conference papers and proceedings
- Cryptographie -- Congrès
- Cryptographie -- Congrès
- Cryptography
- Cryptography -- Congresses
- Systèmes informatiques -- Mesures de sûreté | Congrès
- Sécurité informatique -- Congrès
- authentification
- authentification
- cT-RSA
- clé publique
- clé publique
- commerce électronique
- commerce électronique
- contrôle accès
- contrôle accès
- cryptographers track
- cryptographie
- cryptographie
- cryptology
- rSA
- signature numérique
- signature numérique
- sécurité communication
- sécurité communication
- sécurité donnée
- sécurité donnée
- sécurité information
- sécurité information
- théorie nombre
- théorie nombre
- Computer security
Genre
Member of
Library Locations
-
African Studies LibraryBorrow it771 Commonwealth Avenue, 6th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Astronomy LibraryBorrow it725 Commonwealth Avenue, 6th Floor, Boston, MA, 02445, US42.350259 -71.105717
-
Fineman and Pappas Law LibrariesBorrow it765 Commonwealth Avenue, Boston, MA, 02215, US42.350979 -71.107023
-
Frederick S. Pardee Management LibraryBorrow it595 Commonwealth Avenue, Boston, MA, 02215, US42.349626 -71.099547
-
Howard Gotlieb Archival Research CenterBorrow it771 Commonwealth Avenue, 5th Floor, Boston, MA, 02215, US42.350723 -71.108227
-
-
Music LibraryBorrow it771 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350723 -71.108227
-
Pikering Educational Resources LibraryBorrow it2 Silber Way, Boston, MA, 02215, US42.349804 -71.101425
-
School of Theology LibraryBorrow it745 Commonwealth Avenue, 2nd Floor, Boston, MA, 02215, US42.350494 -71.107235
-
Science & Engineering LibraryBorrow it38 Cummington Mall, Boston, MA, 02215, US42.348472 -71.102257
-
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Topics-in-cryptology-CT-RSA-2002--the/8X7r3B96NSM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Topics-in-cryptology-CT-RSA-2002--the/8X7r3B96NSM/">Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.bu.edu/portal/Topics-in-cryptology-CT-RSA-2002--the/8X7r3B96NSM/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.bu.edu/portal/Topics-in-cryptology-CT-RSA-2002--the/8X7r3B96NSM/">Topics in cryptology, CT-RSA 2002 : the Cryptographers' Track at RSA Conference 2002, San Jose, CA, USA, February 18-22, 2002 : proceedings, Bart Preneel (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.bu.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.bu.edu/">Boston University Libraries</a></span></span></span></span></div>