Advances in Cryptology - ASIACRYPT 2004
Springer Berlin (Verlag)
978-3-540-23975-8 (ISBN)
Block Ciphers.- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds.- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC.- Eliminating Random Permutation Oracles in the Even-Mansour Cipher.- Public Key Encryption.- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles.- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding.- Invited Talk I.- Stream Ciphers: Dead or Alive?.- Number Theory and Algebra.- On the Generalized Linear Equivalence of Functions Over Finite Fields.- Sieving Using Bucket Sort.- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups.- Secure Computation.- Practical Two-Party Computation Based on the Conditional Gate.- Privacy in Non-private Environments.- Asynchronous Proactive Cryptosystems Without Agreement.- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.- Hash Functions.- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions.- Higher Order Universal One-Way Hash Functions.- The MD2 Hash Function Is Not One-Way.- Key Management.- New Approaches to Password Authenticated Key Exchange Based on RSA.- Constant-Round Authenticated Group Key Exchange for Dynamic Groups.- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.- Identification.- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.- Secret Handshakes from CA-Oblivious Encryption.- k-Times Anonymous Authentication (Extended Abstract).- XL-Algorithms.- The XL-Algorithm and a Conjecture from Commutative Algebra.- Comparison Between XL and Gröbner Basis Algorithms.- Digital Signatures.-Generic Homomorphic Undeniable Signatures.- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings.- Public Key Cryptanalysis.- On the Security of MOR Public Key Cryptosystem.- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.- Invited Talk II.- Information Security in Korea IT839 Strategy.- Symmetric Key Cryptanalysis.- How Far Can We Go Beyond Linear Cryptanalysis?.- The Davies-Murphy Power Attack.- Time-Memory Trade-Off Attacks on Multiplications and T-Functions.- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0.- Protocols.- On Provably Secure Time-Stamping Schemes.- Strong Conditional Oblivious Transfer and Computing on Intervals.- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
Erscheint lt. Verlag | 29.11.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XVI, 548 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 830 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Block Ciphers • Bluetooth • Communication • Computational Number Theory • Cryptanalysis • cryptographic protocols • cryptography • Data Security • digital signature schemes • finite field • Information • Kryptographie / Kryptologie • Oracle • privacy • Public Key Cryptosystems • rsa • Secure Communications • security • Stream Ciphers • Systems Security |
ISBN-10 | 3-540-23975-8 / 3540239758 |
ISBN-13 | 978-3-540-23975-8 / 9783540239758 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich