Logo - springer
Slogan - springer

Computer Science - Security and Cryptology | Topics in Cryptology -- CT-RSA 2003 - The Cryptographers' Track at the RSA Conference 2003, San

Topics in Cryptology -- CT-RSA 2003

The Cryptographers' Track at the RSA Conference 2003, San Francisco, CA, USA April 13-17, 2003, Proceedings

Joye, Marc (Ed.)

2003, XII, 424 p.

Available Formats:
eBook
Information

Springer eBooks may be purchased by end-customers only and are sold without copy protection (DRM free). Instead, all eBooks include personalized watermarks. This means you can read the Springer eBooks across numerous devices such as Laptops, eReaders, and tablets.

You can pay for Springer eBooks with Visa, Mastercard, American Express or Paypal.

After the purchase you can directly download the eBook file or read it online in our Springer eBook Reader. Furthermore your eBook will be stored in your MySpringer account. So you can always re-download your eBooks.

 
$99.00

(net) price for USA

ISBN 978-3-540-36563-1

digitally watermarked, no DRM

Included Format: PDF

download immediately after purchase


learn more about Springer eBooks

add to marked items

Softcover
Information

Softcover (also known as softback) version.

You can pay for Springer Books with Visa, Mastercard, American Express or Paypal.

Standard shipping is free of charge for individual customers.

 
$129.00

(net) price for USA

ISBN 978-3-540-00847-7

free shipping for individuals worldwide

usually dispatched within 3 to 5 business days


add to marked items

These are the proceedings of CT-RSA 2003, the Cryptographers’ Track at RSA Conference 2003. The proceedings of CT-RSA 2001 and CT-RSA 2002 were published in Springer-Verlag’s Lecture Notes in Computer Science series as LNCS 2020 and LNCS 2271, respectively. The Cryptographers’ Track is one of the many parallel tracks of the RSA Conference. With many thousands of participants, the RSA Conference is the largest security and cryptography event of the year. There were 97 submitted contributions this year, of which 26, or 27%, were selected for presentation. The program also included two invited talks by Tom Berson (“Cryptography After the Bubble: How to Make an Impact on the World”) and by Adi Shamir (“RSA Shortcuts”). All submissions were reviewed by at least three members of the program committee. I am very grateful to the 21 members of the program committee for their hard and e?cient work in assembling the program. My thanks also go to the 78 external referees who helped in the review process in their area of exp- tise: Gail-Joon Ahn, Toru Akishita, Kazumaro Aoki, Gildas Avoine, Joonsang Baek, Olivier Benoit, Alex Biryukov, Alexandra Boldyreva, Antoon Bosselaers, Emmanuel Bresson, Eric Brier, Brice Canvel, Dario Catalano, Chien Yuan Chen, Donghyeon Cheon, Jung Hee Cheon, Olivier Chevassut, Kilsoo Chun, Mathieu Ciet, Christophe Clavier, Jean-S´ebastien Coron, Reza Curtmola, Christophe De Canni`ere, Jean-Fran¸cois Dhem, Xuhua Ding, Pierre-Alain Fouque, Jacques Fournier, Fabien Germain, Jovan Dj. Goli´c, Philippe Golle, Louis Granboulan, Jorge Guajardo, D. J.

Content Level » Research

Keywords » RSA - RSA cryptosystems - anonymity - authentication - calculus - cryptographic protocolls - cryptography - cryptosystems - data security - data structures - digital - digital signature schemes - identity - public-key cryptosystems - security

Related subjects » Communication Networks - General Issues - Security and Cryptology - Software Engineering - Theoretical Computer Science

Table of contents / Sample pages 

Popular Content within this publication 

 

Articles

Read this Book on Springerlink

Services for this book

New Book Alert

Get alerted on new Springer publications in the subject area of Data Encryption.