Progress in Cryptology – INDOCRYPT 2007
Hashing.- Linearization Attacks Against Syndrome Based Hashes.- A Meet-in-the-Middle Collision Attack Against the New FORK-256.- Multilane HMAC- Security beyond the Birthday Limit.- Elliptic Curve.- On the Bits of Elliptic Curve Diffie-Hellman Keys.- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography.- Cryptoanalysis.- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.- Related-Key Differential-Linear Attacks on Reduced AES-192.- Improved Meet-in-the-Middle Attacks on Reduced-Round DES.- Information Theoretic Security.- Probabilistic Perfectly Reliable and Secure Message Transmission - Possibility, Feasibility and Optimality.- Secret Swarm Unit Reactive k??Secret Sharing.- Elliptic Curve Cryptography.- New Formulae for Efficient Elliptic Curve Arithmetic.- A Graph Theoretic Analysis of Double Base Number Systems.- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication.- Signature.- Transitive Signatures from Braid Groups.- Proxy Re-signature Schemes Without Random Oracles.- Side Channel Attack.- First-Order Differential Power Analysis on the Duplication Method.- Solving Discrete Logarithms from Partial Knowledge of the Key.- Symmetric Cryptosystem.- New Description of SMS4 by an Embedding overGF(28).- Tweakable Enciphering Schemes from Hash-Sum-Expansion.- A Framework for Chosen IV Statistical Analysis of Stream Ciphers.- Asymmetric Cryptosystem.- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols.- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.- Short Presentation.- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues.- On the k-Operation Linear Complexity of PeriodicSequences.- Trade-Off Traitor Tracing.- X-FCSR - A New Software Oriented Stream Cipher Based Upon FCSRs.- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.- Extended Multi-Property-Preserving and ECM-Construction.- Design of a Differential Power Analysis Resistant Masked AES S-Box.- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks.- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function.- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.
| Erscheint lt. Verlag | 16.11.2007 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 428 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 662 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity • anonymity • authentication • bilinear maps • block cipher • Complexity • Cryptanalysis • Cryptographic Attacks • cryptography • Cryptology • Cryptosystems • Data Security • digital signature schemes • Elliptic Curve Cryptography • encryption schemes • fault tolerance • Hardware • hash funcito • hash funciton • identiy based encryption • Information • information secruity • Pairing • proxy cryptosystem • pseudo random function • Public Key Cryptography • Secure Communications • security • Security models • side channel attacks • SIGNATUR • stream cipher • Symbol • symmetric cryptography • Systems Security |
| ISBN-13 | 9783540770251 / 9783540770251 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich