Selected Areas in Cryptography
Springer Berlin (Verlag)
978-3-540-77359-7 (ISBN)
Reduced Complexity Attacks on the Alternating Step Generator.- Extended BDD-Based Cryptanalysis of Keystream Generators.- Two Trivial Attacks on Trivium.- Collisions for 70-Step SHA-1: On the Full Cost of Collision Search.- Cryptanalysis of the CRUSH Hash Function.- Improved Side-Channel Collision Attacks on AES.- Analysis of Countermeasures Against Access Driven Cache Attacks on AES.- Power Analysis for Secret Recovering and Reverse Engineering of Public Key Algorithms.- Koblitz Curves and Integer Equivalents of Frobenius Expansions.- Another Look at Square Roots (and Other Less Common Operations) in Fields of Even Characteristic.- Efficient Explicit Formulae for Genus 2 Hyperelliptic Curves over Prime Fields and Their Implementations.- Explicit Formulas for Efficient Multiplication in .- Linear Cryptanalysis of Non Binary Ciphers.- The Delicate Issues of Addition with Respect to XOR Differences.- MRHS Equation Systems.- A Fast Stream Cipher with Huge State Space and Quasigroup Filter for Software.- Cryptanalysis of White-Box DES Implementations with Arbitrary External Encodings.- Cryptanalysis of White Box DES Implementations.- Attacks on the ESA-PSS-04-151 MAC Scheme.- The Security of the Extended Codebook (XCB) Mode of Operation.- A Generic Method to Design Modes of Operation Beyond the Birthday Bound.- Passive-Only Key Recovery Attacks on RC4.- Permutation After RC4 Key Scheduling Reveals the Secret Key.- Revisiting Correlation-Immunity in Filter Generators.- Distinguishing Attack Against TPypy.
Erscheint lt. Verlag | 12.12.2007 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | X, 412 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 638 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • aes • algorithm • Algorithm analysis and problem complexity • algorithms • authentication • Block Ciphers • Code • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Digital Signatures • Elliptic Curve • Hardcover, Softcover / Informatik, EDV/Informatik • Hash Functions • HC/Informatik, EDV/Informatik • hyperelliptic curve • message authentication code • multivariate cryptography • pairing computation • privacy • Public Key • Public Key Cryptography • Random Graphs • RSA Cryptosystems • security • side channel analysis • side channel attacks • Smartcards • Stream Ciphers • Symmetric Key Cryptosystems |
ISBN-10 | 3-540-77359-2 / 3540773592 |
ISBN-13 | 978-3-540-77359-7 / 9783540773597 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich