Topics in Cryptology -- CT-RSA 2014
Springer International Publishing (Verlag)
9783319048512 (ISBN)
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves.- An Improved Compression Technique for Signatures Based on Learning with Errors.- A Generic View on Trace-and-Revoke Broadcast Encryption Schemes.- Practical Dual-Receiver Encryption: Soundness, Complete Non-malleability, and Applications.- Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation.- On Increasing the Throughput of Stream Ciphers.- On Double Exponentiation for Securing RSA against Fault Analysis.- Side-Channel Attacks.- On the Practical Security of a Leakage Resilient Masking Scheme.- The Myth of Generic DPA... and the Magic of Learning.- Hardware Implementation and Side-Channel Analysis of Lapin.- Automatic Search for Differential Trails in ARX Ciphers.- CBEAM: Efficient Authenticated Encryption from Feebly One-Way phi Functions.- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation.- Group Signatures with Message-Dependent Opening in the Standard Model.- Practical Distributed Signatures in the Standard Model.- Decentralized Traceable Attribute-Based Signatures.- Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.- P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.- 2-Pass Key Exchange Protocols from CPA-Secure KEM.- Analysis of BLAKE2.- An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grphistl.- Practical Collision Attack on 40-Step RIPEMD-128.- KDM Security in the Hybrid Framework.- Key Wrapping with a Fixed Permutation.
| Erscheint lt. Verlag | 4.2.2014 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 501 p. 76 illus. |
| Verlagsort | Cham |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 773 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | block and stream ciphers • cryptanalysis and other attacks • cryptographic primitives • cryptography • Digital Signatures • Hash Functions • Information Security • Key Management • public key encryption • security protocols |
| ISBN-13 | 9783319048512 / 9783319048512 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich