Information Security and Privacy
Springer Berlin (Verlag)
978-3-540-35458-1 (ISBN)
Stream Ciphers.- Algebraic Attacks on Clock-Controlled Stream Ciphers.- Cache Based Power Analysis Attacks on AES.- Distinguishing Attack on SOBER-128 with Linear Masking.- Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks.- Symmetric Key Ciphers.- Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond.- Improved Cryptanalysis of MAG.- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions.- Network Security.- Augmented Certificate Revocation Lists.- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security.- Towards an Invisible Honeypot Monitoring System.- Cryptographic Applications.- Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service.- Fingercasting-Joint Fingerprinting and Decryption of Broadcast Messages.- More on Stand-Alone and Setup-Free Verifiably Committed Signatures.- Secure Implementation.- API Monitoring System for Defeating Worms and Exploits in MS-Windows System.- Hiding Circuit Topology from Unbounded Reverse Engineers.- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications.- Signatures.- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption.- Efficient Identity-Based Signatures Secure in the Standard Model.- Event-Oriented k-Times Revocable-iff-Linked Group Signatures.- Key Replacement Attack Against a Generic Construction of Certificateless Signature.- Theory.- A Novel Range Test.- Efficient Primitives from Exponentiation in ? p .- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity.- Statistical Decoding Revisited.- Invited Talk.- Towards Provable Security for Ubiquitous Applications.- SecurityApplications.- Oblivious Scalar-Product Protocols.- On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases.- Provable Security.- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles.- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT.- Tag-KEM from Set Partial Domain One-Way Permutations.- Protocols.- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys.- Graphical Representation of Authorization Policies for Weighted Credentials.- Secure Cross-Realm C2C-PAKE Protocol.- Hashing and Message Authentication.- Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction.- Forgery and Key Recovery Attacks on PMAC and Mitchell's TMAC Variant.- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.
Erscheint lt. Verlag | 21.6.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 446 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 649 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • authentication • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptosystems • Data Security • digital fingerprinting • digital signature schemes • Encryption • Group Communication • Information • Information Security • Key Management • Monitor • network securi • Network Security • Oracle • privacy • Public Key Cryptosystems • Routing • security • SIGNATUR • WINDOWS |
ISBN-10 | 3-540-35458-1 / 3540354581 |
ISBN-13 | 978-3-540-35458-1 / 9783540354581 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich