Topics in Cryptology - CT-RSA 2009
Springer Berlin (Verlag)
978-3-642-00861-0 (ISBN)
Identity-Based Encryption.- Adaptive-ID Secure Revocable Identity-Based Encryption.- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption.- Protocol Analysis.- Attacks on the DECT Authentication Mechanisms.- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1.- Two-Party Protocols.- Key Insulation and Intrusion Resilience over a Public Channel.- Statistically Hiding Sets.- Adaptively Secure Two-Party Computation with Erasures.- More Than Signatures.- Short Redactable Signatures Using Random Trees.- Divisible On-Line/Off-Line Signatures.- Collisions for Hash Functions.- Speeding up Collision Search for Byte-Oriented Hash Functions.- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.- Cryptanalysis.- A Statistical Saturation Attack against the Block Cipher PRESENT.- Practical Attacks on Masked Hardware.- Cryptanalysis of CTC2.- Alternative Encryption.- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.- Square, a New Multivariate Encryption Scheme.- Privacy and Anonymity.- Communication-Efficient Private Protocols for Longest Common Subsequence.- Key-Private Proxy Re-encryption.- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.- Effciency Improvements.- Practical Short Signature Batch Verification.- Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity.- Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.- Multi-PartyProtocols.- Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values.- Local Sequentiality Does Not Help for Concurrent Composition.- Security of Encryption Schemes.- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening.- Strengthening Security of RSA-OAEP.- Faults and Countermeasures.- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.- Fault Analysis Attack against an AES Prototype Chip Using RSL.- Countermeasures and Faults.- Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags.- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
Erscheint lt. Verlag | 26.3.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 482 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Algorithm analysis and problem complexity • anonymity • authentication • block cipher • Bluetooth • collission search • Cryptanalysis • cryptography • Cryptology • Cryptosystems • DECT authentication • Digital Signatures • fractal hash • Hardcover, Softcover / Informatik, EDV/Informatik • identity-based • Key exchange • privacy • pseudorandom • Public Key Cryptography • public key encryption • RFID • RFID (Radio Frequency Identificatio) • rsa • secure communication • Systems Security |
ISBN-10 | 3-642-00861-5 / 3642008615 |
ISBN-13 | 978-3-642-00861-0 / 9783642008610 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich