Progress in Cryptology - INDOCRYPT 2004
Springer Berlin (Verlag)
978-3-540-24130-0 (ISBN)
Invited Talks.- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects.- Secure Protocols for Complex Tasks in Complex Environments.- Cryptographic Protocols.- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations.- Applications.- On the Security of a Certified E-Mail Scheme.- Multiplicative Homomorphic E-Voting.- Stream Ciphers.- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.- Algebraic Attacks over GF(q).- Cryptographic Boolean Functions.- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.- Generalized Boolean Bent Functions.- On Boolean Functions with Generalized Cryptographic Properties.- Foundations.- Information Theory and the Security of Binary Data Perturbation.- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.- Block Ciphers.- Faster Variants of the MESH Block Ciphers.- Related-Key Attacks on Reduced Rounds of SHACAL-2.- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.- Cryptanalysis of Ake98.- Public Key Encryption.- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes.- HEAD: Hybrid Encryption with Delegated Decryption Capability.- A Provably Secure Elliptic Curve Scheme with Fast Encryption.- Efficient Representations.- Advances in Alternative Non-adjacent Form Representations.- Public Key Cryptanalysis.- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Exact Analysis of Montgomery Multiplication.- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem.- Modes of Operation.- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data.- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.- The Security and Performance of the Galois/Counter Mode (GCM) of Operation.- Signatures.- Revisiting Fully Distributed Proxy Signature Schemes.- New ID-Based Threshold Signature Scheme from Bilinear Pairings.- Separable Linkable Threshold Ring Signatures.- Traitor Tracing and Visual Cryptography.- A New Black and White Visual Cryptographic Scheme for General Access Structures.- Identification Algorithms for Sequential Traitor Tracing.
Erscheint lt. Verlag | 13.12.2004 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 431 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 664 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • boolean function • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Data Security • didgital signature schemes • Information Security • Kryptographie / Kryptologie • privacy • Public Key Cryptography • Secure Communications • Systems Security |
ISBN-10 | 3-540-24130-2 / 3540241302 |
ISBN-13 | 978-3-540-24130-0 / 9783540241300 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich