Cryptography and Coding
Springer Berlin (Verlag)
978-3-540-30276-6 (ISBN)
Invited Papers.- Abstract Models of Computation in Cryptography.- Pairing-Based Cryptography at High Security Levels.- Improved Decoding of Interleaved AG Codes.- Coding Theory.- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics.- A Trellis-Based Bound on (2,1)-Separating Codes.- Tessellation Based Multiple Description Coding.- Exploiting Coding Theory for Collision Attacks on SHA-1.- Signatures and Signcryption.- Hash Based Digital Signature Schemes.- A General Construction for Simultaneous Signing and Encrypting.- Non-interactive Designated Verifier Proofs and Undeniable Signatures.- Symmetric Cryptography.- Partial Key Recovery Attacks on XCBC, TMAC and OMAC.- Domain Expansion of MACs: Alternative Uses of the FIL-MAC.- Normality of Vectorial Functions.- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.- Side Channels.- The Physically Observable Security of Signature Schemes.- On the Automatic Construction of Indistinguishable Operations.- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods.- Algebraic Cryptanalysis.- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem.- An Algebraic Framework for Cipher Embeddings.- Probabilistic Algebraic Attacks.- Information Theoretic Applications.- Unconditionally Secure Information Authentication in Presence of Erasures.- Generalized Strong Extractors and Deterministic Privacy Amplification.- On Threshold Self-healing Key Distribution Schemes.- Number Theoretic Foundations.- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator.- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited.- Pairings on Elliptic Curves over Finite Commutative Rings.- Public Key and ID-Based Encryption Schemes.- A Key Encapsulation Mechanism for NTRU.- Efficient Identity-Based Key Encapsulation to Multiple Parties.- Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme.
From the reviews:
"This book contains selected refereed proceedings of the tenth Institute of Mathematics and its Applications (IMA) international conference. ... The book covers some important research areas in coding and cryptography. ... I think anyone who wants to study or design a system for crypto-protecting sensitive data will find useful information in this book. ... Books such as this are vital to ensuring the progress of theoretical and practical studies on cryptography, one of the most important technologies in the field of computer and network security." (Patriciu Victor-Valeriu, Computing Reviews, August, 2006)
Erscheint lt. Verlag | 9.12.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 468 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 667 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | authentication • Coding • coding theory • Cryptanalysis • Cryptographic Attacks • cryptography • Cryptology • Decoding • encoding • encryption schemes • Information • number theoretic foundations • side channels • Signatures • signcryption • symmetric cryptography |
ISBN-10 | 3-540-30276-X / 354030276X |
ISBN-13 | 978-3-540-30276-6 / 9783540302766 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich