Information Security and Cryptology
Springer International Publishing (Verlag)
978-3-319-16744-2 (ISBN)
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
An Efficient Privacy-Preserving E-coupon System.- Spatial Bloom Filters: Enabling Privacy in Location-Aware Applications.- Security of Direct Anonymous Authentication Using TPM 2.0 Signature.- Revocation in Publicly Verifiable Outsourced Computation.- Private Aggregation with Custom Collusion Tolerance.- Ring Signatures of Constant Size Without Random Oracles.- Universally Composable Identity Based Adaptive Oblivious Transfer with Access Control.- Three-Round Public-Coin Bounded-Auxiliary-Input Zero-Knowledge Arguments of Knowledge.- A Model-Driven Security Requirements Approach to Deduce Security Policies Based on OrBAC.- Optimal Proximity Proofs.- Simpler CCA-Secure Public Key Encryption from Lossy Trapdoor Functions.- Attacking RSA with a Composed Decryption Exponent Using Unravelled Linearization.- Fully Homomorphic Encryption with Auxiliary Inputs.- Trapdoors for Ideal Lattices with Applications.- Speeding Up the Search Algorithm for the Best Differential and Best Linear Trails.- The Boomerang Attacks on BLAKE and BLAKE2.- Second Preimage Analysis of Whirlwind.- Boomerang Attack on Step-Reduced SHA-512.- Collision Attack on 4-Branch, Type-2 GFN Based Hash Functions Using Sliced Biclique Cryptanalysis Technique.- Rig: A Simple, Secure and Flexible Design for Password Hashing.- Efficient Hardware Accelerator for AEGIS-128 Authenticated Encryption.- Fully Collusion-Resistant Traceable Key-Policy Attribute-Based Encryption with Sub-linear Size Ciphertexts.- Integrating Ciphertext-Policy Attribute-Based Encryption with Identity-Based Ring Signature to Enhance Security and Privacy in Wireless Body Area Networks.- Parallelized Software Implementation of Elliptic Curve Scalar Multiplication.- A Note on Diem's Proof.- Stand-by Attacks on E-ID Password Authentication.- Stegomalware: Playing Hide and Seek with Malicious Components in Smartphone Apps.- A Lightweight Security Isolation Approach for Virtual Machines Deployment.- A Novel Approach to True Random NumberGeneration in Wearable Computing Environments Using MEMS Sensors.
Erscheint lt. Verlag | 8.4.2015 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 547 p. 92 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 865 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Algorithmen | |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | anonymity • Applications • authentication • block cipher • Computer Science • conference proceedings • Cryptanalysis • Cryptographic application • Cryptographic primitive • Datensicherung • Elliptic Curve Cryptography • Encryption • hash function • Informatics • Kryptographie / Kryptologie • Lattice cryptography • Meet in the middle • multiparty computation • obfuscation • oblivious transfer • Outsource computation • privacy • Public Key Cryptography • Research • security protocols • Signature protocols • Zero Knowledge |
ISBN-10 | 3-319-16744-8 / 3319167448 |
ISBN-13 | 978-3-319-16744-2 / 9783319167442 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich