HOME > 상세정보

상세정보

Progress in cryptology--Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings

Progress in cryptology--Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings

자료유형
단행본
개인저자
Dawson, Ed (Edward) Vaudenay, Serge.
서명 / 저자사항
Progress in cryptology--Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / Ed Dawson, Serge Vaudenay (eds.).
발행사항
Berlin ;   New York :   Springer,   c2005.  
형태사항
xi, 327 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 3715
ISBN
3540289380 (pbk. : alk. paper) 9783540289388 (pbk. : alk. paper)
일반주기
Also issued online.
서지주기
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
일반주제명
Computer security -- Malaysia -- Congresses. Cryptography -- Malaysia -- Congresses. Data encryption (Computer science) -- Malaysia -- Congresses. Data protection -- Malaysia -- Congresses.
000 02260camuu2200493 a 4500
001 000045562084
005 20091127110046
008 050824s2005 gw a b 101 0 eng c
010 ▼a 2005932807
020 ▼a 3540289380 (pbk. : alk. paper)
020 ▼a 9783540289388 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm61766577
035 ▼a (OCoLC)61766577
035 ▼a (KERIS)REF000012650026
040 ▼a OHX ▼c OHX ▼d BAKER ▼d CUS ▼d C$Q ▼d IQU ▼d VRC ▼d NLGGC ▼d DLC ▼d 211009
042 ▼a pcc
043 ▼a a-my---
050 0 0 ▼a QA76.9.A25 ▼b I5537 2005
072 7 ▼a QA ▼2 lcco
082 0 0 ▼a 005.809595 ▼2 22
090 ▼a 005.8 ▼b I6191p ▼c 1
111 2 ▼a International Conference on Cryptology in Malaysia ▼n (1st : ▼d 2005 : ▼c Kuala Lumpur, Malaysia)
245 1 0 ▼a Progress in cryptology--Mycrypt 2005 : ▼b First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005 : proceedings / ▼c Ed Dawson, Serge Vaudenay (eds.).
246 3 0 ▼a Mycrypt 2005
246 3 0 ▼a Cryptology in Malaysia
246 3 0 ▼a First International Conference on Cryptology in Malaysia
246 3 ▼a 1st International Conference on Cryptology in Malaysia
246 3 0 ▼a International Conference on Cryptology in Malaysia
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xi, 327 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3715
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Computer security ▼z Malaysia ▼v Congresses.
650 0 ▼a Cryptography ▼z Malaysia ▼v Congresses.
650 0 ▼a Data encryption (Computer science) ▼z Malaysia ▼v Congresses.
650 0 ▼a Data protection ▼z Malaysia ▼v Congresses.
700 1 ▼a Dawson, Ed ▼q (Edward)
700 1 ▼a Vaudenay, Serge.
830 0 ▼a Lecture notes in computer science ; ▼v 3715.
945 ▼a KINS

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.8 I6191p 1 등록번호 121186785 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

책소개

Mycrypt 2005 was the inaugural international conference on cryptology hosted in Malaysia. The conference was co-organized by the Information Security - search Lab at Swinburne University of Technology (Sarawak Campus), NISER (National ICT Security and Emergency Response Centre) and INSPEM (Ins- tute for MathematicalResearch)at UPM (UniversityPutra Malaysia).Mycrypt 2005 was held in Kuala Lumpur, Malaysia during September 28 30 2005, in conjunction with the e-Secure Malaysia 2005 convention. Therewere90paper submissionsfrom23 countriescoveringall areasof cr- tologic research, from which 19 were accepted. We would like to extend our thanks to all authors who submitted papers to Mycrypt 2005. Each paper was sentanonymouslytoatleast3membersoftheInternationalProgramCommittee for reviews and comments. The review comments were then followed by disc- sions among the Program Committee. A recipient of the Best Paper Award was also selected after voting among Program Committee members. The winning paper was Distinguishing Attacks on T-functions by Simon Kunzli (FH A- gau, Swizerland), Pascal Junod (Nagravision SA, Switzerland) and Willi Meier (FH Aargau, Swizerland). These proceedings contain revised versions of all the accepted papers. The conference program included three keynote papers: Hideki Imai (Tokyo University)presenteda paper entitled TrendsandChallenges forSecurer Cr- tography in Practice . Moti Yung (Columbia University) presented a paper entitled E?cient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers . Colin Boyd (QUT) presented a paper entitled Security of Two-Party Identity-Based Key Agreement . We are extremely grateful for the time and e?ort of all the members of the Program Committee in the review process. Their names may be found overleaf.


정보제공 : Aladin

목차

Invited Talk I.- Trends and Challenges for Securer Cryptography in Practice.- Stream Ciphers Analysis.- Distinguishing Attacks on T-Functions.- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.- Cryptography Based on Combinatorics.- Equivalent Keys in HFE, C , and Variations.- A New Structural Attack for GPT and Variants.- A Family of Fast Syndrome Based Cryptographic Hash Functions.- Cryptographic Protocols.- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.- Identity Based Delegation Network.- On Session Key Construction in Provably-Secure Key Establishment Protocols.- On the Security of Probabilistic Multisignature Schemes and Their Optimality.- Invited Talk II.- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.- Implementation Issues.- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm.- Power Analysis by Exploiting Chosen Message and Internal Collisions - Vulnerability of Checking Mechanism for RSA-Decryption.- Optimization of the MOVA Undeniable Signature Scheme.- Unconventional Cryptography.- Questionable Encryption and Its Applications.- Twin RSA.- Invited Talk III.- Security of Two-Party Identity-Based Key Agreement.- Block Cipher Cryptanalysis.- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.- Advanced Slide Attacks Revisited: Realigning Slide on DES.- New Multiset Attacks on Rijndael with Large Blocks.- Homomorphic Encryption.- Paillier's Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes.- Homomorphic Cryptosystems Based on Subgroup Membership Problems.


정보제공 : Aladin

관련분야 신착자료

Harvard Business Review (2025)