Progress in Cryptology - VIETCRYPT 2006
Springer Berlin (Verlag)
978-3-540-68799-3 (ISBN)
Signatures and Lightweight Cryptography.- Probabilistic Multivariate Cryptography.- Short 2-Move Undeniable Signatures.- Searching for Compact Algorithms: cgen.- Invited Talk.- On Pairing-Based Cryptosystems.- Pairing-Based Cryptography.- A New Signature Scheme Without Random Oracles from Bilinear Pairings.- Efficient Dynamic k-Times Anonymous Authentication.- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?.- Algorithmic Number Theory.- Factorization of Square-Free Integers with High Bits Known.- Scalar Multiplication on Koblitz Curves Using Double Bases.- Compressed Jacobian Coordinates for OEF.- Ring Signatures and Group Signatures.- On the Definition of Anonymity for Ring Signatures.- Escrowed Linkability of Ring Signatures and Its Applications.- Dynamic Fully Anonymous Short Group Signatures.- Hash Functions.- Formalizing Human Ignorance.- Discrete Logarithm Variants of VSH.- How to Construct Sufficient Conditions for Hash Functions.- Cryptanalysis.- Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.- On the Internal Structure of Alpha-MAC.- A Weak Key Class of XTEA for a Related-Key Rectangle Attack.- Key Agreement and Threshold Cryptography.- Deniable Group Key Agreement.- An Ideal and Robust Threshold RSA.- Towards Provably Secure Group Key Agreement Building on Group Theory.- Public-Key Encryption.- Universally Composable Identity-Based Encryption.- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.- Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
Erscheint lt. Verlag | 27.12.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 388 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 603 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algorithm • Algorithm analysis and problem complexity • algorithms • anonymity • authentication • bilinear pairings • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • digital signature schemes • Elliptic Curve Cryptography • encryption schemes • hash function • identity based encryption • Oracle • pairing-based cryptography • privacy • probabilistic cryptography • Public Key Cryptography • rsa • Secure Communications • Security models • side channel analysis • signature schemes • threshold RSA |
ISBN-10 | 3-540-68799-8 / 3540687998 |
ISBN-13 | 978-3-540-68799-3 / 9783540687993 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich