Advances in Cryptology - CRYPTO 2001
Springer Berlin (Verlag)
978-3-540-42456-7 (ISBN)
Foundations.- On the (Im)possibility of Obfuscating Programs.- Universally Composable Commitments.- Traitor Tracing.- Revocation and Tracing Schemes for Stateless Receivers.- Self Protecting Pirates and Black-Box Traitor Tracing.- Multi-party Computation.- Minimal Complete Primitives for Secure Multi-party Computation.- Robustness for Free in Unconditional Multi-party Computation.- Secure Distributed Linear Algebra in a Constant Number of Rounds.- Two-Party Computation.- Two-Party Generation of DSA Signatures.- Oblivious Transfer in the Bounded Storage Model.- Parallel Coin-Tossing and Constant-Round Secure Two-Party Computation.- Elliptic Curves.- Faster Point Multiplication on Elliptic Curves with Efficient Endomorphisms.- On the Unpredictability of Bits of the Elliptic Curve Diffie-Hellman Scheme.- Identity-Based Encryption from the Weil Pairing.- OAEP.- A Chosen Ciphertext Attack on RSA Optimal Asymmetric Encryption Padding (OAEP) as Standardized in PKCS #1 v2.0.- OAEP Reconsidered.- RSA-OAEP Is Secure under the RSA Assumption.- Simplified OAEP for the RSA and Rabin Functions.- Encryption and Authentication.- Online Ciphers and the Hash-CBC Construction.- The Order of Encryption and Authentication for Protecting Communications (or: How Secure Is SSL?).- Signature Schemes.- Forward-Secure Signatures with Optimal Signing and Verifying.- Improved Online/Offline Signature Schemes.- Protocols.- An Efficient Scheme for Proving a Shuffle.- An Identity Escrow Scheme with Appointed Verifiers.- Session-Key Generation Using Human Passwords Only.- Cryptanalysis.- Cryptanalysis of RSA Signatures with Fixed-Pattern Padding.- Correlation Analysis of the Shrinking Generator.- Applications of Groups and Codes.- Nonlinear Vector Resilient Functions.- New Public Key Cryptosystem UsingFinite Non Abelian Groups.- Pseudorandomness from Braid Groups.- Broadcast and Secret Sharing.- On the Cost of Reconstructing a Secret, or VSS with Optimal Reconstruction Phase.- Secure and Efficient Asynchronous Broadcast Protocols.- Soundness and Zero-Knowledge.- Soundness in the Public-Key Model.- Robust Non-interactive Zero Knowledge.
Erscheint lt. Verlag | 1.8.2001 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 604 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 857 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Algorithmic Number Theory • coding theory • Cryptanalysis • cryptographic protocols • cryptography • data encryption • Digital Signatures • Elliptic Curves • Finite Field Computation • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Kryptologie • privacy • Secure Networking • security • Systems Security |
ISBN-10 | 3-540-42456-3 / 3540424563 |
ISBN-13 | 978-3-540-42456-7 / 9783540424567 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich