Progress in Cryptology -- AFRICACRYPT 2009
Springer Berlin (Verlag)
978-3-642-02383-5 (ISBN)
Hash Functions.- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.- Cryptanalysis of Vortex.- Two Passes of Tiger Are Not One-Way.- Block Ciphers.- Generic Attacks on Feistel Networks with Internal Permutations.- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks.- Asymmetric Encryption.- Reducing Key Length of the McEliece Cryptosystem.- Cryptanalysis of RSA Using the Ratio of the Primes.- Digital Signatures.- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes.- A Schnorr-Like Lightweight Identity-Based Signature Scheme.- On the Theoretical Gap between Group Signatures with and without Unlinkability.- Practical Threshold Signatures with Linear Secret Sharing Schemes.- Asymmetric Encryption and Anonymity.- Certified Encryption Revisited.- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.- Anonymity from Public Key Encryption to Undeniable Signatures.- Key Agreement Protocols.- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.- Cryptographic Protocols.- Unifying Zero-Knowledge Proofs of Knowledge.- Co-sound Zero-Knowledge with Public Keys.- Another Look at Extended Private Information Retrieval Protocols.- Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions.- Efficient Implementations.- Exponent Recoding and Regular Exponentiation Algorithms.- Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware.- Fast Elliptic-Curve Cryptography on the Cell Broadband Engine.- On Modular Decomposition of Integers.- Implementation Attacks.- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed.- An Improved Fault Based Attack of the Advanced Encryption Standard.
Erscheint lt. Verlag | 8.6.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 435 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 682 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Algorithm analysis and problem complexity • anonymity • authenticated encryption • authentication • biometrics • block cipher • Cryptanalysis • cryptographic protocols • cryptography • DES • Elliptic Curves • Hardcover, Softcover / Informatik, EDV/Informatik • Hash Functions • Information • keyed hash functions • Lightweight cryptography • oblivious transfer • pairing-based cryptography • privacy • provable security • Public-Key Cryptography • Rijndael attacks • Robustness • rsa • security • side channel attacks • signature schemes • standard model • Systems Security • threshold cryptography |
ISBN-10 | 3-642-02383-5 / 3642023835 |
ISBN-13 | 978-3-642-02383-5 / 9783642023835 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich