Topics in Cryptology - CT-RSA 2009
Springer Berlin (Verlag)
9783642008610 (ISBN)
Identity-Based Encryption.- Adaptive-ID Secure Revocable Identity-Based Encryption.- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations.- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption.- Protocol Analysis.- Attacks on the DECT Authentication Mechanisms.- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1.- Two-Party Protocols.- Key Insulation and Intrusion Resilience over a Public Channel.- Statistically Hiding Sets.- Adaptively Secure Two-Party Computation with Erasures.- More Than Signatures.- Short Redactable Signatures Using Random Trees.- Divisible On-Line/Off-Line Signatures.- Collisions for Hash Functions.- Speeding up Collision Search for Byte-Oriented Hash Functions.- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security.- Cryptanalysis.- A Statistical Saturation Attack against the Block Cipher PRESENT.- Practical Attacks on Masked Hardware.- Cryptanalysis of CTC2.- Alternative Encryption.- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model.- Square, a New Multivariate Encryption Scheme.- Privacy and Anonymity.- Communication-Efficient Private Protocols for Longest Common Subsequence.- Key-Private Proxy Re-encryption.- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems.- Effciency Improvements.- Practical Short Signature Batch Verification.- Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity.- Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients.- Multi-PartyProtocols.- Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values.- Local Sequentiality Does Not Help for Concurrent Composition.- Security of Encryption Schemes.- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening.- Strengthening Security of RSA-OAEP.- Faults and Countermeasures.- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable.- Fault Analysis Attack against an AES Prototype Chip Using RSL.- Countermeasures and Faults.- Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags.- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation.
| Erscheint lt. Verlag | 26.3.2009 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 482 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | aes • Algorithm analysis and problem complexity • anonymity • authentication • block cipher • Bluetooth • collission search • Cryptanalysis • cryptography • Cryptology • Cryptosystems • DECT authentication • Digital Signatures • fractal hash • Hardcover, Softcover / Informatik, EDV/Informatik • identity-based • Key exchange • privacy • pseudorandom • Public Key Cryptography • public key encryption • RFID • RFID (Radio Frequency Identificatio) • rsa • secure communication • Systems Security |
| ISBN-13 | 9783642008610 / 9783642008610 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich