Selected Areas in Cryptography
Springer Berlin (Verlag)
978-3-540-00622-0 (ISBN)
Elliptic Curve Enhancements.- Modifications of ECDSA.- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves.- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.- SNOW.- Guess-and-Determine Attacks on SNOW.- A New Version of the Stream Cipher SNOW.- Encryption Schemes.- Encryption-Scheme Security in the Presence of Key-Dependent Messages.- On the Security of CTR + CBC-MAC.- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.- Differential Attacks.- Markov Truncated Differential Cryptanalysis of Skipjack.- Higher Order Differential Attack of Camellia(II).- Square-like Attacks on Reduced Rounds of IDEA.- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.- Boolean Functions and Stream Ciphers.- On Propagation Characteristics of Resilient Functions.- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).- Multiples of Primitive Polynomials and Their Products over GF(2).- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function.- Block Cipher Security.- White-Box Cryptography and an AES Implementation.- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive.- Signatures and Secret Sharing.- New Results on Unconditionally Secure Distributed Oblivious Transfer.- Efficient Identity Based Signature Schemes Based on Pairings.- The Group Diffie-Hellman Problems.- MAC and Hash Constructions.- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.- An Efficient MAC for Short Messages.- RSA and XTR Enhancements.- Optimal Extension Fields for XTR.- On Some Attacks on Multi-prime RSA.
Erscheint lt. Verlag | 25.2.2003 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 412 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 594 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • boolean function • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • data encryption • Data Security • Digital Signatures • Elliptic Curve • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • privacy • rsa • RSA Cryptosystems • secure communication • security |
ISBN-10 | 3-540-00622-2 / 3540006222 |
ISBN-13 | 978-3-540-00622-0 / 9783540006220 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich