Provable Security
Springer Berlin (Verlag)
9783642412264 (ISBN)
On Modeling Terrorist Frauds: Addressing Collusion in Distance Bounding Protocols.- Authenticated Key Exchange Protocols Based on Factoring Assumption.- Efficient, Pairing-Free, Authenticated Identity Based Key Agreement in a Single Round.- CIL Security Proof for a Password-Based Key Exchange.- Non Observability in the Random Oracle Model.- Indistinguishability against Chosen Ciphertext Verification Attack Revisited: The Complete Picture.- Input-Aware Equivocable Commitments and UC-secure Commitments with Atomic Exchanges.- Towards Anonymous Ciphertext Indistinguishability with Identity Leakage.- k-Time Proxy Signature: Formal Definition and Efficient Construction.- Anonymous Signcryption against Linear Related-Key Attacks.- Improved Authenticity Bound of EAX, and Refinements.- The Security of the OCB Mode of Operation without the SPRP Assumption.- A Short Universal Hash Function from Bit Rotation, and Applications to Blockcipher Modes.- How to Remove the Exponent GCD in HK09.- Translation-Randomizable Distributions via Random Walks.- RKA Secure PKE Based on the DDH and HR Assumptions.- Computationally Efficient Dual-Policy Attribute Based Encryption with Short Ciphertext.- Factoring-Based Proxy Re-Encryption Schemes.- Towards a Secure Certificateless Proxy Re-Encryption Scheme.
| Erscheint lt. Verlag | 18.9.2013 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | X, 347 p. 36 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 545 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | authentication • ciphers • Computational Efficiency • re-encryption schemes • verification attack |
| ISBN-13 | 9783642412264 / 9783642412264 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich