Download Progress in Cryptology — INDOCRYPT 2001: Second by Anne Canteaut (auth.), C. Pandu Rangan, Cunsheng Ding (eds.) PDF

By Anne Canteaut (auth.), C. Pandu Rangan, Cunsheng Ding (eds.)

INDOCRYPT 2001, the second one Annual Crypto convention, is evidence of the s- ni?cant volume of enthusiasm generated between Indian in addition to overseas crypto groups. INDOCRYPT 2001 was once equipped via the Indian Institute of expertise, Madras and the Institute of Mathematical Sciences, additionally positioned in Madras (now Chennai). This occasion used to be enthusiastically co-sponsored by way of eAl- traz ConsultingPrivate Ltd, Chennai, Odyssey applied sciences Ltd, Chennai, and Shanmuga Arts technology expertise and examine Academy (SASTRA), Th- javur. this system Committee Co-chair, Prof.C.Pandu Rangan used to be liable for neighborhood association and registration. this system Committee thought of seventy seven papers and chosen 31 papers for presentation. those papers have been chosen at the foundation of perceived originality, caliber, and relevance to the ?eld of cryptography. The complaints contain the revised model of the authorised papers. Revisions weren't checked as to their contents and authors endure complete accountability for the contents in their submissions. the choice of papers is a really challengingand demandingtask. we want to thank this system Committee contributors who did a superb activity in reviewing the submissions despite serious time constraints imposed by means of the tight p- cessingschedule. each one submission was once reviewed via a minimum of 3 referees (only a number of by way of two). this system Committee was once ably assisted through plenty of reviewers of their strong point. The checklist of reviewers has been supplied individually. Our thank you visit all of them.

Show description

Read Online or Download Progress in Cryptology — INDOCRYPT 2001: Second International Conference on Cryptology in India Chennai, India, December 16–20, 2001 Proceedings PDF

Similar international_1 books

Adventures in Mathematical Physics: International Conference in Honor of Jean-michel Combes on Transport and Spectral Problems in Quantum Mechanics ... Universite De Cerg

This quantity contains refereed examine articles written by means of the various audio system at this foreign convention in honor of the sixty-fifth birthday of Jean-Michel Combes. the themes span glossy mathematical physics with contributions on cutting-edge ends up in the idea of random operators, together with localization for random Schrodinger operators with normal chance measures, random magnetic Schrodinger operators, and interacting multiparticle operators with random potentials; shipping houses of Schrodinger operators and classical Hamiltonian platforms; equilibrium and nonequilibrium houses of open quantum structures; semiclassical tools for multiparticle platforms and long-time evolution of wave packets; modeling of nanostructures; houses of eigenfunctions for first-order structures and recommendations to the Ginzburg-Landau process; powerful Hamiltonians for quantum resonances; quantum graphs, together with scattering concept and hint formulation; random matrix thought; and quantum info conception.

Complete International Law: Text, Cases and Materials

Entire foreign legislation combines quite a lot of case extracts with incisive writer statement to obviously reveal felony rules and the importance of case legislations. This cutting edge textual content encourages an lively method of studying with key element summaries, considering issues and self-test questions all through; which goal to stimulate mirrored image concerning the value of foreign legislation in modern-day global.

Proceedings of the 22nd International Conference on Industrial Engineering and Engineering Management 2015: Core Theory and Applications of Industrial Engineering (Volume 1)

Being the premiere discussion board for the presentation of recent advances and examine ends up in the fields of commercial Engineering, IEEM 2015 goals to supply a high-level overseas discussion board for specialists, students and marketers at domestic and in another country to give the hot advances, new concepts and functions face and face, to advertise dialogue and interplay between teachers, researchers and pros to advertise the advancements and purposes of the comparable theories and applied sciences in universities and agencies, and to set up enterprise or study relatives to discover international companions for destiny collaboration within the box of business Engineering.

Additional resources for Progress in Cryptology — INDOCRYPT 2001: Second International Conference on Cryptology in India Chennai, India, December 16–20, 2001 Proceedings

Sample text

Rivest and S. Dusse, “RFC 1321: The MD5 message-digest algorithm”, Internet Activities Board, Apr. 1992. 15. L. Rivest and A. Shamir, “PayWord and MicroMint: Two simple micropayment schemes”, Technical report, MIT Laboratory for Computer Science, Nov. 1995. 16. T. F. Tschudin, “Protecting mobile agent against malicious hosts”, in Mobile Agents and Security, LNCS 1419. Berlin: Springer-Verlag, 1998, pp. 4460. 17. K. B. Sriram, “Hashjava - a java applet obfuscator”, July 1997. html 18. J. P. Stern, G.

A necessary condition for this approach to be practical is that the agent route be protected. Previous proposals for agent route protection either offer low security or suffer from high computational costs due to cryptographic operations. We present two fast, hash-based mechanisms for agent route protection. The first solution relies on hash collisions and focuses on minimizing the computational cost of route verification by hosts along the route; the cost is shifted to the stage of route protection by the agent owner.

Provided that the hash function used is one-way and collisionfree, there is no loss of security with respect to signing messages individually. 2 for the hash collision scheme. P1. To modify the i-th step, Ui should be modified into Ui = Ui . This would require finding a ver-path for Ui such that its verification yields the same root value obtained from verification of the ver-path of Ui . If the hash function used is one-way and collision-free, this is computationally infeasible. P2,P3,P4,P5. 2. Mobile Agent Route Protection through Hash-Based Mechanisms 5 27 Conclusions and Extension to Flexible Itineraries One approach to secure mobile agent execution is restricting the agent route to trusted environments.

Download PDF sample

Rated 4.50 of 5 – based on 38 votes