Topics in Cryptology –- CT-RSA 2015
Springer International Publishing (Verlag)
978-3-319-16714-5 (ISBN)
Timing Attacks.- Just A Little Bit More.- Cache Storage Attacks.- Design and Analysis of Block Ciphers.- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.- Improved Attacks on Reduced-Round Camellia-128/192/256.- Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.- Membership.- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives.- Non-Interactive Zero-Knowledge Proofs of Non-Membership.- Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8.- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.- Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.- Format Oracles on OpenPGP.- Algorithms for Solving Hard Problems.- Finding Shortest Lattice Vectors in the Presence of Gaps.- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints.- Constructions of Hash Functions and Message Authentication Codes.- Hash Functions from Defective Ideal Ciphers.- Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication.- Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers.- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party.- Computation.- Authenticated Encryption.- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.- Cryptanalysis of Ascon.- Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.- Implementation Attacks on Exponentiation Algorithms.- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace.- Cold Boot Attacks in the Discrete Logarithm Setting.- Homomorphic Encryption and Its Applications.- Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
Erscheint lt. Verlag | 25.3.2015 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 508 p. 79 illus. |
Verlagsort | Cham |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 807 g |
Themenwelt | Informatik ► Netzwerke ► Sicherheit / Firewall |
Informatik ► Theorie / Studium ► Kryptologie | |
Schlagworte | authorization • block and stream ciphers • cryptanalysis and other attacks • cryptography • Digital rights management • Digital Signatures • hash functions and message authentication codes • Information • intrusion/anomaly detection and malware mitigation • Key Management • Kryptographie / Kryptologie • mathematical foundations of cryptography • privacy-preserving protocols • pseudonymity, anonymity and untraceability • public key (asymmetric) techniques • public key encryption • Quantum Cryptography • security in hardware • side-channel analysis and countermeasures • software security engineering • symmetric cryptography and hash functions • Theoretic techniques |
ISBN-10 | 3-319-16714-6 / 3319167146 |
ISBN-13 | 978-3-319-16714-5 / 9783319167145 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich