Topics in Cryptology - CT-RSA 2002
Springer Berlin (Verlag)
978-3-540-43224-1 (ISBN)
Public Key Cryptography.- On Hash Function Firewalls in Signature Schemes.- Observability Analysis - Detecting When Improved Cryptosystems Fail -.- Efficient Hardware Implementations.- Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli.- Montgomery in Practice: How to Do It More Efficiently in Hardware.- MIST: An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis.- An ASIC Implementation of the AES SBoxes.- Public Key Cryptography: Theory.- On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function.- The Representation Problem Based on Factoring.- Symmetric Ciphers.- Ciphers with Arbitrary Finite Domains.- Known Plaintext Correlation Attack against RC5.- E-Commerce and Applications.- Micropayments Revisited.- Proprietary Certificates.- Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption.- Digital Signatures.- RSA-Based Undeniable Signatures for General Moduli.- Co-operatively Formed Group Signatures.- Transitive Signature Schemes.- Homomorphic Signature Schemes.- Public Key Encryption.- GEM: A Generic Chosen-Ciphertext Secure Encryption Method.- Securing "Encryption + Proof of Knowledge" in the Random Oracle Model.- Discrete Logarithm.- Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture.- Secure Key-Evolving Protocols for Discrete Logarithm Schemes.
Erscheint lt. Verlag | 6.2.2002 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | X, 318 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 463 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • Algorithm analysis and problem complexity • authentication • Computational Number Theory • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Data Security • Hardcover, Softcover / Informatik, EDV/Informatik • Hardware • HC/Informatik, EDV/Informatik • Information Security • Kryptologie • Public Key Cryptosystems • rsa • secure communication |
ISBN-10 | 3-540-43224-8 / 3540432248 |
ISBN-13 | 978-3-540-43224-1 / 9783540432241 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich