Research in Cryptology
Springer Berlin (Verlag)
978-3-540-88352-4 (ISBN)
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.- The GPS Identification Scheme Using Frobenius Expansions.- Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256.- Efficient Hash Collision Search Strategies on Special-Purpose Hardware.- Cryptography Based on Quadratic Forms: Complexity Considerations.- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme.- Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups.- Preimages for Reduced-Round Tiger.- Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.- Combiner Driven Management Models and Their Applications.- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.- Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation.
Erscheint lt. Verlag | 8.10.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 153 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 264 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | achterbahn-128 • algebraic attacs • Complexity • Cryptanalysis • cryptography • discrete logarithm • frobenius expansion • GPS • Hardcover, Softcover / Informatik, EDV/Informatik • hash collision • HC/Informatik, EDV/Informatik • protection • quadratic forms • reduced-round tiger • sha-256 • tpy-6 |
ISBN-10 | 3-540-88352-5 / 3540883525 |
ISBN-13 | 978-3-540-88352-4 / 9783540883524 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich