Selected Areas in Cryptography
Springer Berlin (Verlag)
978-3-540-33108-7 (ISBN)
Stream Ciphers I.- Conditional Estimators: An Effective Attack on A5/1.- Cryptanalysis of the F-FCSR Stream Cipher Family.- Fault Attacks on Combiners with Memory.- Block Ciphers.- New Observation on Camellia.- Proving the Security of AES Substitution-Permutation Network.- Modes of Operation.- An Attack on CFB Mode Encryption as Used by OpenPGP.- Parallelizable Authentication Trees.- Improved Time-Memory Trade-Offs with Multiple Data.- Public Key Cryptography.- A Space Efficient Backdoor in RSA and Its Applications.- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.- Stream Ciphers II.- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners.- Rekeying Issues in the MUGI Stream Cipher.- Key Establishment Protocols and Access Control.- Tree-Based Key Distribution Patterns.- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security.- Hash Functions.- Breaking a New Hash Function Design Strategy Called SMASH.- Analysis of a SHA-256 Variant.- Impact of Rotations in SHA-1 and Related Hash Functions.- Protocols for RFID Tags.- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.- Reducing Time Complexity in RFID Systems.- Efficient Implementations.- Accelerated Verification of ECDSA Signatures.- Pairing-Friendly Elliptic Curves of Prime Order.- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving.- SPA Resistant Left-to-Right Integer Recodings.- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .
Erscheint lt. Verlag | 23.3.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 371 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 544 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | A5 • Access Control • aes • Algorithm analysis and problem complexity • authentication • Block Ciphers • Complexity • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • DES • Digital Signatures • Elliptic Curve • Hash Functions • OpenPGP • privacy • Public Key Cryptography • RFID systems • RSA Cryptosystems • security protocols • Stream Ciphers • Substitution |
ISBN-10 | 3-540-33108-5 / 3540331085 |
ISBN-13 | 978-3-540-33108-7 / 9783540331087 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich