Cryptology and Network Security
Springer Berlin (Verlag)
978-3-540-89640-1 (ISBN)
Cryptosystems.- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.- Hybrid Damgård Is CCA1-Secure under the DDH Assumption.- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption.- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.- Signatures.- Efficient and Short Certificateless Signature.- Sanitizable Signatures Revisited.- An Efficient On-Line/Off-Line Signature Scheme without Random Oracles.- On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.- Identification, Authentication and Key Management.- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.- Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange.- Cryptanalysis of EC-RAC, a RFID Identification Protocol.- Cryptographic Algorithms and Protocols.- Counting Method for Multi-party Computation over Non-abelian Groups.- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.- Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes.- Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols.- Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography.- Stream Ciphers and Block Ciphers.- Cryptanalysis of MV3 Stream Cipher.- 3D: A Three-Dimensional Block Cipher.- Cryptographic Foundations.- Construction of Resilient Functions with Multiple Cryptographic Criteria.- Enumeration of Homogeneous Rotation Symmetric Functions over F p .- Unconditionally Reliable Message Transmission in Directed Hypergraphs.- Applications and Implementations.- An Open Framework for Remote Electronic Elections.- Conditional Payments forComputing Markets.- High-Speed Search System for PGP Passphrases.- Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.- Security in Ad Hoc Networks and Wireless Sensor Networks.- Authenticated Directed Diffusion.- A New Message Recognition Protocol for Ad Hoc Pervasive Networks.
Erscheint lt. Verlag | 13.11.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 395 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 621 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | ad hoc networks • aes • Algorithm analysis and problem complexity • anonymity • authentication • Block Ciphers • Cryptanalysis • cryptographic protocols • cryptography • digital signature • DoS attacks • Elliptic Curve Cryptography • Encryption • group signatures • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identification • Intrusion Detection • Key Management • linear structure • minimal function • multiparty computation • Network Security • nonlinearity • pairings • provable security • public key encryption • Recognition • Reputation • RFID • RFID (Radio Frequency Identificatio) • rsa • secure computation • secure proxy • security • sensor networks • signature schemes • signcryption • Stream Ciphers • trust management • wireless sensor networks |
ISBN-10 | 3-540-89640-6 / 3540896406 |
ISBN-13 | 978-3-540-89640-1 / 9783540896401 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich