Topics in Cryptology – CT-RSA 2007
Springer Berlin (Verlag)
978-3-540-69327-7 (ISBN)
Symmetric-Key Encryption.- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.- A Simple Related-Key Attack on the Full SHACAL-1.- Signatures and Authentication.- Impossibility Proofs for RSA Signatures in the Standard Model.- Selecting Secure Passwords.- Human Identification Through Image Evaluation Using Secret Predicates.- Hash Functions.- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.- Second Preimages for SMASH.- Digital Signatures (I).- A Practical Optimal Padding for Signature Schemes.- Directed Transitive Signature Scheme.- Identity-Based Multi-signatures from RSA.- Cryptographic Protocols (I).- Improved Efficiency for Private Stable Matching.- Compact E-Cash from Bounded Accumulator.- Batch Processing of Interactive Proofs.- Side-Channel Attacks (I).- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.- Predicting Secret Keys Via Branch Prediction.- Side-Channel Attacks (II).- Template Attacks on Masking-Resistance Is Futile.- Differential Power Analysis of Stream Ciphers.- Cache Based Remote Timing Attack on the AES.- Cryptographic Protocols (II).- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.- Efficient Password-Authenticated Key Exchange Based on RSA.- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.- Digital Signatures (II).- A Practical and Tightly Secure Signature Scheme Without Hash Function.- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.- Efficient Implementation.- Public Key Cryptography and RFID Tags.- A Bit-Slice Implementation of the Whirlpool Hash Function.
Erscheint lt. Verlag | 22.12.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 403 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 632 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Algorithm analysis and problem complexity • anonymity • authentication • Block Ciphers • Calculus • CCA encryption • Cisco • Computational Number Theory • Cryptanalysis • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Data Security • Digital Signatures • Identification • Information Security • Integrity • multi-party protocols • Public Key • Public Key Cryptography • Public-Key Cryptosystems • RFID tags • rsa • RSA Cryptosystems • secure communication • side-channel attacks • SIGNATUR • signature schemes • Stream Ciphers • systems integrity • Systems Security • Whirlpool |
ISBN-10 | 3-540-69327-0 / 3540693270 |
ISBN-13 | 978-3-540-69327-7 / 9783540693277 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich