Advances in Cryptology - ASIACRYPT 2010
Springer Berlin (Verlag)
978-3-642-17372-1 (ISBN)
Hash Attacks.- Rotational Rebound Attacks on Reduced Skein.- Finding Second Preimages of Short Messages for Hamsi-256.- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl.- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.- Collision Attacks against the Knudsen-Preneel Compression Functions.- Symmetric-Key Cryptosystems.- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.- The World Is Not Enough: Another Look on Second-Order DPA.- Block and Stream Ciphers.- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.- A Byte-Based Guess and Determine Attack on SOSEMANUK.- Improved Single-Key Attacks on 8-Round AES-192 and AES-256.- Protocols.- Constant-Size Commitments to Polynomials and Their Applications.- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.- Key Exchange.- Generic Compilers for Authenticated Key Exchange.- A Forward-Secure Symmetric-Key Derivation Protocol.- Foundation.- Efficient String-Commitment from Weak Bit-Commitment.- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields.- Random Oracles with(out) Programmability.- Zero-Knowledge.- Short Pairing-Based Non-interactive Zero-Knowledge Arguments.- Short Non-interactive Zero-Knowledge Proofs.- Optimistic Concurrent Zero Knowledge.- Lattice-Based Cryptography.- Faster Fully Homomorphic Encryption.- A Group Signature Scheme from Lattice Assumptions.- Lattice-Based Blind Signatures.- Secure Communication and Computation.- The Round Complexity of Verifiable Secret Sharing: The Statistical Case.- General Perfectly Secure Message Transmission UsingLinear Codes.- On Invertible Sampling and Adaptive Security.- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition.- Models, Notions, and Assumptions.- A Closer Look at Anonymity and Robustness in Encryption Schemes.- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.- Public-Key Encryption.- The Degree of Regularity of HFE Systems.- Structured Encryption and Controlled Disclosure.- Leakage Resilient ElGamal Encryption.- Efficient Public-Key Cryptography in the Presence of Key Leakage.
Erscheint lt. Verlag | 16.11.2010 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 634 p. 70 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Gewicht | 900 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algebraic cryptanalysis • Algorithm analysis and problem complexity • Block Ciphers • Complexity • Cryptanalysis • cryptographic assumptions • cryptography • DES • differential cryptanalysis • encryption schemes • generic attacks • Information Security • Key Management • linear codes • multiparty computation • multivariate polynomials • robust encryption • rotational cryptanalysis • secure computation • single-key attacks • Skein • Tiger • Zero Knowledge |
ISBN-10 | 3-642-17372-1 / 3642173721 |
ISBN-13 | 978-3-642-17372-1 / 9783642173721 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich