Information Security and Cryptoloy - ICISC 2008
Springer Berlin (Verlag)
978-3-642-00729-3 (ISBN)
Public Key Encryption.- Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption.- Distributed Attribute-Based Encryption.- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors.- Simple Algorithms for Computing a Sequence of 2-Isogenies.- Key Management and Secret Sharing.- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks.- Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images.- Privacy and Digital Rights.- The Swiss-Knife RFID Distance Bounding Protocol.- Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique.- Anonymous Fingerprinting for Predelivery of Contents.- Instruction Set Limitation in Support of Software Diversity.- Digital Signature and Voting.- Non-interactive Identity-Based DNF Signature Scheme and Its Extensions.- How to Balance Privacy with Authenticity.- Efficient Vote Validity Check in Homomorphic Electronic Voting.- Side Channel Attack.- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches.- Novel PUF-Based Error Detection Methods in Finite State Machines.- Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices.- Hash and MAC.- A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs.- Extended Models for Message Authentication.- A Preimage Attack for 52-Step HAS-160.- Primitives and Foundations.- Essentially Optimal Universally Composable Oblivious Transfer.- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification.- Proving a Shuffle Using Representations of the SymmetricGroup.- On Formal Verification of Arithmetic-Based Cryptographic Primitives.- Block and Stream.- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent.- Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis.- Higher Order Differential Attacks on Reduced-Round MISTY1.
Erscheint lt. Verlag | 26.3.2009 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIII, 433 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 663 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Access Control • algebraic attack • Algorithm analysis and problem complexity • anonymity • authentication • Collision • copyright protection • Cryptanalysis • cryptographic algorithms • cryptographic primitives • cryptographic protocols • cryptography • Cryptology • Cryptosystems • Data Security • Digital rights management • Distributed Architecture • Elliptic Curve Cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • identity-based encryption • Information • Network Security • Neural networks • oblivious transfer • privacy • provable security • Public Key • Public Key Cryptography • Reliability • RFID • RFID (Radio Frequency Identificatio) • rsa • secure communication • Security model • semantic security • Systems Security |
ISBN-10 | 3-642-00729-5 / 3642007295 |
ISBN-13 | 978-3-642-00729-3 / 9783642007293 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich