Applied Cryptography and Network Security
Springer Berlin (Verlag)
978-3-642-01956-2 (ISBN)
Key Exchange.- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys.- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol.- Secure Pairing of "Interface-Constrained" Devices Resistant against Rushing User Behavior.- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results.- Secure Computation.- Novel Precomputation Schemes for Elliptic Curve Cryptosystems.- Practical Secure Evaluation of Semi-private Functions.- Secure Hamming Distance Based Computation and Its Applications.- Efficient Robust Private Set Intersection.- Public-Key Encryption.- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack.- An Efficient Identity-Based Online/Offline Encryption Scheme.- Dual-Policy Attribute Based Encryption.- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions.- Network Security I.- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis.- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks.- Traitor Tracing.- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size.- Tracing and Revoking Pirate Rebroadcasts.- Authentication and Anonymity.- Efficient Deniable Authentication for Signatures.- Homomorphic MACs: MAC-Based Integrity for Network Coding.- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN.- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks.- Hash Functions.- Cryptanalysis of Twister.- Cryptanalysis of CubeHash.- Collision Attack on Boole.- Network Security II.- Integrity Protection for Revision Control.- Fragility of the Robust Security Network: 802.11 Denial of Service.- Fast Packet Classification Using Condition Factorization.- Lattices.- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches.- Broadcast Attacks against Lattice-Based Cryptosystems.- Partial Key Exposure Attack on CRT-RSA.- Side-Channel Attacks.- How to Compare Profiled Side-Channel Attacks?.- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis.- Attacking ECDSA-Enabled RFID Devices.
Erscheint lt. Verlag | 25.5.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 535 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 822 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | ad hoc networks • ciphertext attack • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • denial of service • Elliptic Curve Cryptography • hamming distance • Hardcover, Softcover / Informatik, EDV/Informatik • identity-based encryption • Internet Security • lattice-based cryptosystems • lattice reduction • Malware • Naxos • Network Security • p2p keys • pervasive networks • provable security • RFID • rsa • secret handshakes • secure pairing • side-channel attack • signature • Trust |
ISBN-10 | 3-642-01956-0 / 3642019560 |
ISBN-13 | 978-3-642-01956-2 / 9783642019562 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich