Provable Security
Springer Berlin (Verlag)
978-3-642-41226-4 (ISBN)
On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols.- Authenticated Key Exchange Protocols Based on Factoring Assumption.- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.- CIL Security Proof for a Password-Based Key Exchange.- Non Observability in the Random Oracle Model.- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture.- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges.- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.- k-Time Proxy Signature: Formal Definition and Efficient Construction.- Anonymous Signcryption against Linear Related-Key Attacks.- Improved Authenticity Bound of EAX, and Refinements.- The Security of the OCB Mode of Operation without the SPRP Assumption.- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes.- How to Remove the Exponent GCD in HK09.- Translation-Randomizable Distributions via Random Walks.- RKA Secure PKE Based on the DDH and HR Assumptions.- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.- Factoring-Based Proxy Re-Encryption Schemes.- Towards a Secure Certificateless Proxy Re-Encryption Scheme.
Erscheint lt. Verlag | 18.9.2013 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 347 p. 36 illus. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 545 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • ciphers • Computational Efficiency • re-encryption schemes • verification attack |
ISBN-10 | 3-642-41226-2 / 3642412262 |
ISBN-13 | 978-3-642-41226-4 / 9783642412264 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich