Progress in Cryptology -- AFRICACRYPT 2009
Hash Functions.- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL.- Cryptanalysis of Vortex.- Two Passes of Tiger Are Not One-Way.- Block Ciphers.- Generic Attacks on Feistel Networks with Internal Permutations.- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks.- Asymmetric Encryption.- Reducing Key Length of the McEliece Cryptosystem.- Cryptanalysis of RSA Using the Ratio of the Primes.- Digital Signatures.- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes.- A Schnorr-Like Lightweight Identity-Based Signature Scheme.- On the Theoretical Gap between Group Signatures with and without Unlinkability.- Practical Threshold Signatures with Linear Secret Sharing Schemes.- Asymmetric Encryption and Anonymity.- Certified Encryption Revisited.- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems.- Anonymity from Public Key Encryption to Undeniable Signatures.- Key Agreement Protocols.- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness.- Cryptographic Protocols.- Unifying Zero-Knowledge Proofs of Knowledge.- Co-sound Zero-Knowledge with Public Keys.- Another Look at Extended Private Information Retrieval Protocols.- Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions.- Efficient Implementations.- Exponent Recoding and Regular Exponentiation Algorithms.- Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware.- Fast Elliptic-Curve Cryptography on the Cell Broadband Engine.- On Modular Decomposition of Integers.- Implementation Attacks.- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed.- An Improved Fault Based Attack of the Advanced Encryption Standard.
| Erscheint lt. Verlag | 8.6.2009 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 435 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 682 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | aes • Algorithm analysis and problem complexity • anonymity • authenticated encryption • authentication • biometrics • block cipher • Cryptanalysis • cryptographic protocols • cryptography • DES • Elliptic Curves • Hardcover, Softcover / Informatik, EDV/Informatik • Hash Functions • Information • keyed hash functions • Lightweight cryptography • oblivious transfer • pairing-based cryptography • privacy • provable security • Public-Key Cryptography • Rijndael attacks • Robustness • rsa • security • side channel attacks • signature schemes • standard model • Systems Security • threshold cryptography |
| ISBN-13 | 9783642023835 / 9783642023835 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich