Selected Areas in Cryptography
Springer Berlin (Verlag)
978-3-540-74461-0 (ISBN)
Block Cipher Cryptanalysis.- Improved DST Cryptanalysis of IDEA.- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.- Related-Key Rectangle Attack on the Full SHACAL-1.- Stream Cipher Cryptanalysis I.- Cryptanalysis of Achterbahn-Version 2.- Cryptanalysis of the Stream Cipher ABC v2.- The Design of a Stream Cipher LEX.- Dial C for Cipher.- Improved Security Analysis of XEX and LRW Modes.- Extended Hidden Number Problem and Its Cryptanalytic Applications.- Changing the Odds Against Masked Logic.- Advances on Access-Driven Cache Attacks on AES.- Blind Differential Cryptanalysis for Enhanced Power Attacks.- Efficient Implementations I.- Efficient Implementations of Multivariate Quadratic Systems.- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems.- Stream Cipher Cryptanalysis II.- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.- Multi-pass Fast Correlation Attack on Stream Ciphers.- Crossword Puzzle Attack on NLS.- Invited Talk.- When Stream Cipher Analysis Meets Public-Key Cryptography.- Efficient Implementations II.- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets.- Pairing Calculation on Supersingular Genus 2 Curves.- Efficient Divisor Class Halving on Genus Two Curves.- Message Authentication on 64-Bit Architectures.- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme.- Constructing an Ideal Hash Function from Weak Ideal Compression Functions.- Provably Good Codes for Hash Function Design.
Erscheint lt. Verlag | 21.9.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 395 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 576 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • aes • Algorithm analysis and problem complexity • authentication • Block Ciphers • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • DES • Digital Signatures • Elliptic Curve • Hardcover, Softcover / Informatik, EDV/Informatik • Hash Functions • HC/Informatik, EDV/Informatik • hyperelliptic curve • hyper-threading • message authentication code • multivari • multivariate cryptography • pairing computation • privacy • Public Key Cryptography • RFID systems • RSA Cryptosystems • side channel analysis • side channel attacks • Smartcards • Stream Ciphers • Symmetric Key Cryptosystems |
ISBN-10 | 3-540-74461-4 / 3540744614 |
ISBN-13 | 978-3-540-74461-0 / 9783540744610 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich