Security and Cryptography for Networks
Springer Berlin (Verlag)
978-3-540-85854-6 (ISBN)
Invited Talk.- Storage Encryption: A Cryptographer's View.- Session 1: Implementations.- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.- CLL: A Cryptographic Link Layer for Local Area Networks.- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification.- Session 2: Protocols I.- Privacy Preserving Data Mining within Anonymous Credential Systems.- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function.- Session 3: Encryption I.- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications.- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption.- Session 4: Encryption II.- General Certificateless Encryption and Timed-Release Encryption.- Efficient Certificate-Based Encryption in the Standard Model.- Session 5: Primitives.- An Improved Robust Fuzzy Extractor.- On Linear Secret Sharing for Connectivity in Directed Graphs.- Session 6: Signatures.- Expressive Subgroup Signatures.- Anonymous Proxy Signatures.- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem.- Session 7: Hardware and Cryptanalysis.- Using Normal Bases for Compact Hardware Implementations of the AES S-Box.- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes.- Full Cryptanalysis of LPS and Morgenstern Hash Functions.- A New DPA Countermeasure Based on Permutation Tables.- Session 8: Protocols II.- Simplified Submission of Inputs to Protocols.- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited.- Session 9: Encryption III.- Linear Bandwidth Naccache-Stern Encryption.- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment.- ConstructingStrong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).- Session 10: Key Exchange.- New Anonymity Notions for Identity-Based Encryption.- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.- An Identity-Based Key Agreement Protocol for the Network Layer.
Erscheint lt. Verlag | 28.8.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 423 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Advanced Encryption Standard • aes • Algorithm analysis and problem complexity • anonymity • Communication Security • Cryptanalysis • cryptography • Cryptology • DES • digital signature schemes • Distributed Systems Security • Efficiency • Elliptic Curve Cryptography • embedded cryptography • Error Probability • group signatures • Hardcover, Softcover / Informatik, EDV/Informatik • Hardware Implementation • HC/Informatik, EDV/Informatik • information theoretic security • multiparty computation • Network Security • Padding • privacy • probabilistic encryption • Public Key Cryptography • RFID tags • S-box • secure communication • Secure Networking • session ID generation • standard model |
ISBN-10 | 3-540-85854-7 / 3540858547 |
ISBN-13 | 978-3-540-85854-6 / 9783540858546 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich