Advances in Cryptology — CRYPTO ’96
Springer Berlin (Verlag)
978-3-540-61512-5 (ISBN)
Hashing and Authentication I.- Keying Hash Functions for Message Authentication.- Universal Hashing and Multiple Authentication.- Universal Hash Functions from Exponential Sums over Finite Fields and Galois Rings.- New Systems.- Asymmetric Cryptography with a Hidden Monomial.- Anonymous Communication and Anonymous Cash.- Asymmetric Systems.- Weaknesses in Some Threshold Cryptosystems.- Hidden Collisions on DSS.- The Dark Side of "Black-Box" Cryptography or: Should We Trust Capstone?.- Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems.- Hard Bits.- All Bits in ax + b mod p are Hard.- Hardness of Computing the Most Significant Bits of Secret Keys in Diffie-Hellman and Related Schemes.- Signatures.- Security of 2t-Root Identification and Signatures.- Robust and Efficient Sharing of RSA Functions.- New Generation of Secure and Practical RSA-Based Signatures.- Zero Knowledge.- Proving Without Knowing: On Oblivious, Agnostic and Blindfolded Provers.- Practical and Provably-Secure Commitment Schemes from Collision-Free Hashing.- Symmetric Systems.- Improved Differential Attacks on RC5.- Improving Implementable Meet-in-the-Middle Attacks by Orders of Magnitude.- More on Symmetric Systems.- Key-Schedule Cryptanalysis of IDEA, G-DES, GOST, SAFER, and Triple-DES.- How to Protect DES Against Exhaustive Key Search.- Diffie-Hellman Oracle.- Diffie-Hellman Oracles.- Algorithms for Black-Box Fields and their Application to Cryptography.- Hashing and Authentication II.- Fast Hashing on the Pentium.- On Fast and Provably Secure Message Authentication Based on Universal Hashing.- Quantum Crypto.- Quantum Cryptography over Underground Optical Fibers.- Quantum Key Distribution and String Oblivious Transfer in Noisy Channels.- Stream Ciphers.- LinearComplexity of Periodic Sequences: A General Theory.- Generalization of Siegenthaler Inequality and Schnorr-Vaudenay Multipermutations.- Secret Sharing.- Trade-offs Between Communication and Storage in Unconditionally Secure Schemes for Broadcast Encryption and Interactive Key Distribution.- New Results on Visual Cryptography.
Erscheint lt. Verlag | 24.7.1996 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XII, 415 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 563 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • authentication • combinatorics • Cryptoanalysis • cryptographic protocol • cryptographic protocols • cryptography • Cryptology • data encryption • Datenverschlüsselung • Digitale Signaturen • digital signature • Digital Signatures • Encryption • Kryptoanalyse • Kryptographie / Kryptologie • Kryptographische Protokolle • Quantum Cryptography • Quatencryptographi • Quatencryptographie |
ISBN-10 | 3-540-61512-1 / 3540615121 |
ISBN-13 | 978-3-540-61512-5 / 9783540615125 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich