Information Security and Privacy
Springer Berlin (Verlag)
978-3-540-22379-5 (ISBN)
Broadcast Encryption and Traitor Tracing.- Multi-service Oriented Broadcast Encryption.- Secure and Insecure Modifications of the Subset Difference Broadcast Encryption Scheme.- Linear Code Implies Public-Key Traitor Tracing with Revocation.- TTS without Revocation Capability Secure Against CCA2.- Private Information Retrieval and Oblivious Transfer.- Single Database Private Information Retrieval with Logarithmic Communication.- Information Theoretically Secure Oblivious Polynomial Evaluation: Model, Bounds, and Constructions.- Trust and Secret Sharing.- Optimistic Fair Exchange Based on Publicly Verifiable Secret Sharing.- NGSCB: A Trusted Open System.- Cryptanalysis (I).- The Biryukov-Demirci Attack on Reduced-Round Versions of IDEA and MESH Ciphers.- Differential-Linear Type Attacks on Reduced Rounds of SHACAL-2.- The Related-Key Rectangle Attack - Application to SHACAL-1.- Related Key Differential Cryptanalysis of Full-Round SPECTR-H64 and CIKS-1.- The Security of Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders.- Cryptanalysis (II).- Analysis of a Conference Scheme Under Active and Passive Attacks.- Cryptanalysis of Two Password-Authenticated Key Exchange Protocols.- Analysis and Improvement of Micali's Fair Contract Signing Protocol.- Digital Signatures (I).- Digital Signature Schemes with Domain Parameters.- Generic Construction of Certificateless Signature.- Cryptosystems (I).- A Generalization of PGV-Hash Functions and Security Analysis in Black-Box Model.- How to Re-use Round Function in Super-Pseudorandom Permutation.- How to Remove MAC from DHIES.- Symmetric Key Authentication Services Revisited.- Fast Computation.- Improvements to the Point Halving Algorithm.- Theoretical Analysis of XL over Small Fields.- A New Methodfor Securing Elliptic Scalar Multiplication Against Side-Channel Attacks.- Mobile Agents Security.- A Mobile Agent System Providing Offer Privacy.- Digital Signatures (II).- Identity-Based Strong Designated Verifier Signature Schemes.- Linkable Spontaneous Anonymous Group Signature for Ad Hoc Groups.- A Group Signature Scheme with Efficient Membership Revocation for Reasonable Groups.- Convertible Nominative Signatures.- Protocols.- Protocols with Security Proofs for Mobile Applications.- Secure Bilinear Diffie-Hellman Bits.- Weak Property of Malleability in NTRUSign.- Security Management.- Information Security Risk Assessment, Aggregation, and Mitigation.- Access Control and Authorisation.- A Weighted Graph Approach to Authorization Delegation and Conflict Resolution.- Authorization Mechanisms for Virtual Organizations in Distributed Computing Systems.- Cryptosystems (II).- Unconditionally Secure Encryption Under Strong Attacks.- ManTiCore: Encryption with Joint Cipher-State Authentication.- Cryptanalysis (III).- On Security of XTR Public Key Cryptosystems Against Side Channel Attacks.- On the Exact Flexibility of the Flexible Countermeasure Against Side Channel Attacks.- Fault Attacks on Signature Schemes.
Erscheint lt. Verlag | 25.6.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 498 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 746 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • Code • Cryptanalysis • cryptographic protocols • Cryptographic Systems • cryptography • Cryptology • Data Security • Datenschutz • digital signature schemes • Distributed Computing • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity • Information • Information Security • Network Security • privacy • private information retrieval • Resolution • security • SIGNATUR • Systems Security • Trust |
ISBN-10 | 3-540-22379-7 / 3540223797 |
ISBN-13 | 978-3-540-22379-5 / 9783540223795 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich