LEADER 06769nam 22008415 450 001 996466041703316 005 20200704062007.0 010 $a3-540-44495-5 024 7 $a10.1007/3-540-44495-5 035 $a(CKB)1000000000211378 035 $a(SSID)ssj0000325948 035 $a(PQKBManifestationID)11262701 035 $a(PQKBTitleCode)TC0000325948 035 $a(PQKBWorkID)10265291 035 $a(PQKB)11468156 035 $a(DE-He213)978-3-540-44495-4 035 $a(MiAaPQ)EBC3072082 035 $a(PPN)155195441 035 $a(EXLCZ)991000000000211378 100 $a20121227d2000 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aProgress in Cryptology - INDOCRYPT 2000$b[electronic resource] $eFirst International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings /$fedited by Bimal Kumar Roy, Eiji Okamoto 205 $a1st ed. 2000. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2000. 215 $a1 online resource (X, 302 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1977 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-41452-5 320 $aIncludes bibliographical references and index. 327 $aStream Ciphers and Boolean Functions -- The Correlation of a Boolean Function with Its Variables -- On Choice of Connection-Polynomials for LFSR-Based Stream Ciphers -- On Resilient Boolean Functions with Maximal Possible Nonlinearity -- Cryptanalysis I : Stream Ciphers -- Decimation Attack of Stream Ciphers -- Cryptanalysis of the A5/1 GSM Stream Cipher -- Cryptanalysis II : Block Ciphers -- On Bias Estimation in Linear Cryptanalysis -- On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks -- Improved Impossible Differentials on Twofish -- Electronic Cash & Multiparty Computation -- An Online, Transferable E-Cash Payment System -- Anonymity Control in Multi-bank E-Cash System -- Efficient Asynchronous Secure Multiparty Distributed Computation -- Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation -- Digital Signatures -- Codes Identifying Bad Signatures in Batches -- Distributed Signcryption -- Fail-Stop Signature for Long Messages (Extended Abstract) -- Elliptic Curves -- Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure against the Timing Attack -- Efficient Construction of Cryptographically Strong Elliptic Curves -- Fast Arithmetic -- High-Speed Software Multiplication in F2m -- On Efficient Normal Basis Multiplication -- Cryptographic Protocols -- Symmetrically Private Information Retrieval -- Two-Pass Authenticated Key Agreement Protocol with Key Confirmation -- Anonymous Traceability Schemes with Unconditional Security -- Block Ciphers & Public Key Cryptography -- New Block Cipher DONUT Using Pairwise Perfect Decorrelation -- Generating RSA Keys on a Handheld Using an Untrusted Server -- A Generalized Takagi-Cryptosystem with a Modulus of the Form prqs. 330 $aThe field of Cryptology witnessed a revolution in the late seventies. Since then it has been expanded into an important and exciting area of research. Over the last two decades, India neither participated actively nor did it contribute sig­ nificantly towards the development in this field. However, recently a number of active research groups engaged in important research and developmental work have crystalized in different parts of India. As a result, their interaction with the international crypto community has become necessary. With this backdrop, it was proposed that a conference on cryptology - INDOCRYPT, be organized for the first time in India. The Indian Statistical Institute was instrumental in hosting this conference. INDOCRYPT has generated a large amount of enthu­ siasm amongst the Indians as well as the International crypto communities. An INDOCRYPT steering committee has been formed and the committee has plans to make INDOCRYPT an annual event. For INDOCRYPT 2000, the program committee considered a total of 54 pa­ pers and out of these 25 were selected for presentation. The conference program also included two invited lectures by Prof. Adi Shamir and Prof. Eli Biham. These proceedings include the revised versions of the 25 papers accepted by the program committee. These papers were selected from all the submissions based on originality, quality and relevance to the field of Cryptology. Revisions were not checked and the authors bear the full responsibility for the contents of the papers in these proceedings. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1977 606 $aData encryption (Computer science) 606 $aComputer communication systems 606 $aComputer programming 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aOperating systems (Computers) 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aProgramming Techniques$3https://scigraph.springernature.com/ontologies/product-market-codes/I14010 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 615 0$aData encryption (Computer science). 615 0$aComputer communication systems. 615 0$aComputer programming. 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aOperating systems (Computers). 615 14$aCryptology. 615 24$aComputer Communication Networks. 615 24$aProgramming Techniques. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aOperating Systems. 676 $a005.8/2 702 $aRoy$b Bimal Kumar$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aOkamoto$b Eiji$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference in Cryptology in India 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a996466041703316 996 $aProgress in Cryptology - INDOCRYPT 2000$92179782 997 $aUNISA