Advances in Cryptology – ASIACRYPT 2007
Springer Berlin (Verlag)
978-3-540-76899-9 (ISBN)
Number Theory and Elliptic Curve.- A Kilobit Special Number Field Sieve Factorization.- When e-th Roots Become Easier Than Factoring.- Faster Addition and Doubling on Elliptic Curves.- Protocol.- A Non-interactive Shuffle with Pairing Based Verifiability.- On Privacy Models for RFID.- Invited Talk I.- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust.- A Simple Variant of the Merkle-Damgård Scheme with a Permutation.- Seven-Property-Preserving Iterated Hashing: ROX.- How to Build a Hash Function from Any Collision-Resistant Function.- Fully Anonymous Group Signatures Without Random Oracles.- Group Encryption.- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys.- Boosting Merkle-Damgård Hashing for Message Authentication.- On Efficient Message Authentication Via Block Cipher Design Techniques.- Symmetric Key Cryptography on Modern Graphics Hardware.- Multiparty Computation I.- Blind Identity-Based Encryption and Simulatable Oblivious Transfer.- Multi-party Indirect Indexing and Applications.- Two-Party Computing with Encrypted Data.- Known-Key Distinguishers for Some Block Ciphers.- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.- On Tweaking Luby-Rackoff Blockciphers.- Multiparty Computation II.- Secure Protocols with Asymmetric Trust.- Simple and Efficient Perfectly-Secure Asynchronous MPC.- Efficient Byzantine Agreement with Faulty Minority.- Information-Theoretic Security Without an Honest Majority.- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.- Anonymous Quantum Communication.- Invited Talk II.- Authenticated Key Exchange and Key Encapsulation in the StandardModel.- Miniature CCA2 PK Encryption: Tight Security Without Redundancy.- Bounded CCA2-Secure Encryption.- Relations Among Notions of Non-malleability for Encryption.- Cryptanalysis of the Tiger Hash Function.- Cryptanalysis of Grindahl.- A Key Recovery Attack on Edon80.
Erscheint lt. Verlag | 12.11.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 583 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 875 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • Block Ciphers • Computational Algebra • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Data Security • digital signature schemes • Elliptic Curves • Generic Algorithms • group signatures • Hash Functions • Information • Information Theory • message authentication • Number Theory • privacy • Public Key • Public Key Cryptography • Quantum Cryptography • RFID • RFID (Radio Frequency Identificatio) • rijndael • rsa • Secure Multiparty Computation • security • side-channel attacks • Stream Ciphers |
ISBN-10 | 3-540-76899-8 / 3540768998 |
ISBN-13 | 978-3-540-76899-9 / 9783540768999 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich