Topics in Cryptology -- CT-RSA 2014
Springer International Publishing (Verlag)
978-3-319-04851-2 (ISBN)
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves.- An Improved Compression Technique for Signatures Based on Learning with Errors.- A Generic View on Trace-and-Revoke Broadcast Encryption Schemes.- Practical Dual-Receiver Encryption: Soundness, Complete Non-malleability, and Applications.- Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation.- On Increasing the Throughput of Stream Ciphers.- On Double Exponentiation for Securing RSA against Fault Analysis.- Side-Channel Attacks.- On the Practical Security of a Leakage Resilient Masking Scheme.- The Myth of Generic DPA... and the Magic of Learning.- Hardware Implementation and Side-Channel Analysis of Lapin.- Automatic Search for Differential Trails in ARX Ciphers.- CBEAM: Efficient Authenticated Encryption from Feebly One-Way phi Functions.- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation.- Group Signatures with Message-Dependent Opening in the Standard Model.- Practical Distributed Signatures in the Standard Model.- Decentralized Traceable Attribute-Based Signatures.- Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.- P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.- 2-Pass Key Exchange Protocols from CPA-Secure KEM.- Analysis of BLAKE2.- An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grphistl.- Practical Collision Attack on 40-Step RIPEMD-128.- KDM Security in the Hybrid Framework.- Key Wrapping with a Fixed Permutation.
Erscheint lt. Verlag | 4.2.2014 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 501 p. 76 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 773 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | block and stream ciphers • cryptanalysis and other attacks • cryptographic primitives • cryptography • Digital Signatures • Hash Functions • Information Security • Key Management • public key encryption • security protocols |
ISBN-10 | 3-319-04851-1 / 3319048511 |
ISBN-13 | 978-3-319-04851-2 / 9783319048512 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich