Public Key Cryptography - PKC 2006
Springer Berlin (Verlag)
9783540338512 (ISBN)
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
Cryptanalysis and Protocol Weaknesses.- New Attacks on RSA with Small Secret CRT-Exponents.- An Attack on a Modified Niederreiter Encryption Scheme.- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.- Distributed Crypto-computing.- Efficient Polynomial Operations in the Shared-Coefficients Setting.- Generic On-Line/Off-Line Threshold Signatures.- Linear Integer Secret Sharing and Distributed Exponentiation.- Encryption Methods.- Encoding-Free ElGamal Encryption Without Random Oracles.- Parallel Key-Insulated Public Key Encryption.- Provably Secure Steganography with Imperfect Sampling.- Cryptographic Hash and Applications.- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.- Number Theory Algorithms.- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve.- Efficient Scalar Multiplication by Isogeny Decompositions.- Curve25519: New Diffie-Hellman Speed Records.- Pairing-Based Cryptography.- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.- Generalization of the Selective-ID Security Model for HIBE Protocols.- Identity-Based Aggregate Signatures.- On the Limitations of the Spread of an IBE-to-PKE Transformation.- Cryptosystems Design and Analysis.- Inoculating Multivariate Schemes Against Differential Attacks.- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.- High-Order Attacks Against the Exponent Splitting Protection.- Signature and Identification.- New Online/Offline Signature Schemes Without Random Oracles.- Anonymous Signature Schemes.- The Power of Identification Schemes.- Authentication and Key Establishment.- Security Analysis of KEA Authenticated Key Exchange Protocol.- SAS-Based Authenticated Key Agreement.- The Twist-AUgmented Technique for Key Exchange.- Password-Based Group Key Exchange in a Constant Number of Rounds.- Multi-party Computation.- Conditional Oblivious Cast.- Efficiency Tradeoffs for Malicious Two-Party Computation.- PKI Techniques.- On Constructing Certificateless Cryptosystems from Identity Based Encryption.- Building Better Signcryption Schemes with Tag-KEMs.- Security-Mediated Certificateless Cryptography.- k-Times Anonymous Authentication with a Constant Proving Cost.
| Erscheint lt. Verlag | 18.4.2006 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science |
| Zusatzinfo | XIV, 543 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 1720 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • authentication • Cryptanalysis • cryptographic algorithms • cryptography • DES • digital signature schemes • distributed crypto-computing • encryption methods • group key exchange • identity-based encryption • PKI techniques • Public Key Cryptography • Public Key Cryptosystems • public key encryption • RSA attack • RSA attacks • signcryption |
| ISBN-13 | 9783540338512 / 9783540338512 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich