Information Security and Cryptology - ICISC 2001
Springer Berlin (Verlag)
978-3-540-43319-4 (ISBN)
Practical Security in Public-Key Cryptography.- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.- Truncated Differential Cryptanalysis of Camellia.- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding.- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.- Decentralized Event Correlation for Intrusion Detection.- Enhancing the Security of Cookies.- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation.- Efficient Revocation Schemes for Secure Multicast.- Binary Codes for Collusion-Secure Fingerprinting.- Copyright Protection of Object-Oriented Software.- Off-Line Authentication Using Watermarks.- Slide Attacks with a Known-Plaintext Cryptanalysis.- Constructions of Cheating Immune Secret Sharing.- Private Computation with Shared Randomness over Broadcast Channel.- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements.- Practical Reasoning about Accountability in Electronic Commerce Protocols.- Content Extraction Signatures.- New Signcryption Schemes Based on KCDSA.- An Efficient and Provably Secure Threshold Blind Signature.- A Multi-signature Scheme with Signers' Intentions Secure against Active Attacks.- A Distributed Light-Weight Authentication Model for Ad-hoc Networks.- Design of an Authentication Protocol for Gsm Javacards.- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile ComputingEnvironment.- Protecting General Flexible Itineraries of Mobile Agents.- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.- DPA Countermeasure Based on the "Masking Method".
Erscheint lt. Verlag | 6.3.2002 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIII, 460 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 713 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • algorithms • authentication • Cryptanalysis • cryptographic • cryptography • Cryptology • Cryptosystems • data encryption • Data Security • DES • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information Security • Informtion security • Network Security • Public Key Cryptosystems • Secure Communications • signcryption • Substitution • Systems Security |
ISBN-10 | 3-540-43319-8 / 3540433198 |
ISBN-13 | 978-3-540-43319-4 / 9783540433194 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich