Selected Areas in Cryptography
Springer Berlin (Verlag)
978-3-642-05443-3 (ISBN)
Hash Functions I.- Practical Collisions for SHAMATA-256.- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher.- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function.- Miscellaneous Techniques.- More on Key Wrapping.- Information Theoretically Secure Multi Party Set Intersection Re-visited.- Real Traceable Signatures.- Hash Functions II.- Cryptanalysis of Hash Functions with Structures.- Cryptanalysis of the LANE Hash Function.- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384.- Hardware Implementation and Cryptanalysis.- A More Compact AES.- Optimization Strategies for Hardware-Based Cofactorization.- More on the Security of Linear RFID Authentication Protocols.- Differential Fault Analysis of Rabbit.- An Improved Recovery Algorithm for Decayed AES Key Schedule Images.- Block Ciphers.- Cryptanalysis of the Full MMB Block Cipher.- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis.- Improved Integral Attacks on MISTY1.- New Results on Impossible Differential Cryptanalysis of Reduced-Round Camellia-128.- Modes of Operation.- Format-Preserving Encryption.- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption.- Implementation of Public Key Cryptography.- On Repeated Squarings in Binary Fields.- Highly Regular m-Ary Powering Ladders.- An Efficient Residue Group Multiplication for the ? T Pairing over .- Compact McEliece Keys from Goppa Codes.- Hash Functions and Stream Ciphers.- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård.- Cryptanalysis of Dynamic SHA(2).- A New Approach for FCSRs.- New Cryptanalysis of Irregularly Decimated Stream Ciphers.
Erscheint lt. Verlag | 5.11.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 467 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 735 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • algorithms • Block Ciphers • Calculus • cryptography • DES • Hardcover, Softcover / Informatik, EDV/Informatik • hash function • Hash Functions • Information • Kryptographie / Kryptologie • LA • Mac • Permutation • privacy • Public Key • security • Stream Ciphers • symmetric key |
ISBN-10 | 3-642-05443-9 / 3642054439 |
ISBN-13 | 978-3-642-05443-3 / 9783642054433 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich