Cryptology and Network Security
Springer Berlin (Verlag)
978-3-642-17618-0 (ISBN)
Block Ciphers.- Cryptanalysis of Reduced-Round MIBS Block Cipher.- Impossible Differential Cryptanalysis of ARIA Reduced to 7 Rounds.- An Algorithm Based Concurrent Error Detection Scheme for AES.- Invited Talk I.- Cryptography for Unconditionally Secure Message Transmission in Networks (Invited Talk).- Wireless Network Security.- Performance and Security Aspects of Client-Side SSL/TLS Processing on Mobile Devices.- A Practical Cryptographic Denial of Service Attack against 802.11i TKIP and CCMP.- User Tracking Based on Behavioral Fingerprints.- Hash Functions.- On the Collision and Preimage Resistance of Certain Two-Call Hash Functions.- Integral Distinguishers of Some SHA-3 Candidates.- Near-Collisions on the Reduced-Round Compression Functions of Skein and BLAKE.- Public Key Cryptography.- Practical Algebraic Cryptanalysis for Dragon-Based Cryptosystems.- Generating Parameters for Algebraic Torus-Based Cryptosystems.- Analysis of the MQQ Public Key Cryptosystem.- Efficient Scalar Multiplications for Elliptic Curve Cryptosystems Using Mixed Coordinates Strategy and Direct Computations.- Invited Talk II.- Cryptography Meets Hardware: Selected Topics of Hardware-Based Cryptography (Invited Talk).- Secure Mechanisms.- Towards a Cryptographic Treatment of Publish/Subscribe Systems.- STE3D-CAP: Stereoscopic 3D CAPTCHA.- TRIOB: A Trusted Virtual Computing Environment Based on Remote I/O Binding Mechanism.- Cryptographic Protocols.- Dynamic Group Key Exchange Revisited.- Towards Practical and Secure Coercion-Resistant Electronic Elections.- Anonymous Credentials.- Predicate Encryption with Partial Public Keys.- Anonymous Credential Schemes with Encrypted Attributes.- One Time Anonymous Certificate: X.509 Supporting Anonymity.
Erscheint lt. Verlag | 22.11.2010 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 355 p. 66 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Block Ciphers • CCMP • CRIB • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Elliptic Curves • Encryption • Hash Functions • Networks • sha-3 • Skein • wireless networks • wireless sensor • x.509 |
ISBN-10 | 3-642-17618-6 / 3642176186 |
ISBN-13 | 978-3-642-17618-0 / 9783642176180 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich