Topics in Cryptology -- CT-RSA 2006
Springer Berlin (Verlag)
978-3-540-31033-4 (ISBN)
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES-192.- Identification.- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.- Fair Identification.- Algebra.- Efficient Doubling on Genus 3 Curves over Binary Fields.- Another Look at Small RSA Exponents.- Integrity.- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing.- RFID-Tags for Anti-counterfeiting.- Public Key Encryption.- A "Medium-Field" Multivariate Public-Key Encryption Scheme.- A New Security Proof for Damgård's ElGamal.- Signatures.- Stand-Alone and Setup-Free Verifiably Committed Signatures.- Toward the Fair Anonymous Signatures: Deniable Ring Signatures.- Side-Channel Attacks.- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.- Higher Order Masking of the AES.- CCA Encryption.- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.- Message Authentication.- On the (Im)possibility of Blind Message Authentication Codes.- An Optimal Non-interactive Message Authentication Protocol.- Block Ciphers.- A New Criterion for Nonlinearity of Block Ciphers.- Block Ciphers Sensitive to Gröbner Basis Attacks.- Multi-party Computation.- Universally Composable Oblivious Transfer in the Multi-party Setting.- A Round and Communication Efficient Secure Ranking Protocol.
Erscheint lt. Verlag | 19.1.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 365 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 1190 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Algorithm analysis and problem complexity • anonymity • authentication • Block Ciphers • CCA encryption • Communication • Computational Number Theory • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Data Security • DES • Digital Signatures • Identification • Information Security • Integrity • message authentication code • Multi-Party Computation • Oracle • Public Key Cryptography • Public-Key Cryptosystems • rsa • RSA Cryptosystems • secure communication • security • side-channel attacks • systems integrity • Systems Security |
ISBN-10 | 3-540-31033-9 / 3540310339 |
ISBN-13 | 978-3-540-31033-4 / 9783540310334 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich