Selected Areas in Cryptography
Springer Berlin (Verlag)
978-3-642-35998-9 (ISBN)
Cryptanalysis.- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers.- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery.- Cryptanalysis of the Xiao - Lai White-Box AES Implementation.- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model.- Forward Secure Signatures on Smart Cards.- The Stafford Tavares Lecture Extracts from the SHA-3 Competition.- Stream CiphersCryptanalysis of the "Kindle" Cipher.- Cryptographically Strong de Bruijn Sequences with Large Periods.- Cryptanalysis of the Loiss Stream Cipher.- Implementations.- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three.- Efficient Implementation of Bilinear Pairings on ARM Processors.- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223.- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.- Block Cipher Cryptanalysis.- All Subkeys Recovery Attack on Block Ciphers: ExtendingMeet-in-the-Middle Approach.- Improved Cryptanalysis of the Block Cipher KASUMI.- Meet-in-the-Middle Technique for Integral Attacks against FeistelCiphers.- Attacking (EC)DSA Given Only an Implicit Hint.- Lattice Reduction for Modular Knapsack.- Hash Functions.- The Boomerang Attacks on the Round-Reduced Skein-512.- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.- Provable Security of BLAKE with Non-ideal Compression Function.- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms.- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.- Miscellaneous.- Private Stream Search at Almost the Same Communication Cost as a Regular Search.- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
Erscheint lt. Verlag | 3.1.2013 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 407 p. 61 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 646 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Blowfish • digital signature • keyword search • meet-in-the-middle attack • Smart cards |
ISBN-10 | 3-642-35998-1 / 3642359981 |
ISBN-13 | 978-3-642-35998-9 / 9783642359989 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich