Advances in Cryptology - CRYPTO 2002
Springer Berlin (Verlag)
978-3-540-44050-5 (ISBN)
Dr. Moti Yung is Senior Researcher at Columbia University and an editor of the International Association for Cryptologic Research's Journal of Cryptology.
Block Ciphers.- Essential Algebraic Structure within the AES.- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC.- Tweakable Block Ciphers.- Multi-user Oriented Cryptosystems.- The LSD Broadcast Encryption Scheme.- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.- Foundations and Methodology.- Provably Secure Steganography.- Flaws in Applying Proof Methodologies to Signature Schemes.- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case.- Security of Practical Protocols.- On the Security of RSA Encryption in TLS.- Security Analysis of IKE's Signature-Based Key-Exchange Protocol.- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks.- Secure Multiparty Computation.- On 2-Round Secure Multiparty Computation.- Private Computation - k-Connected versus 1-Connected Networks.- Public-Key Encryption.- Analysis and Improvements of NTRU Encryption Paddings.- Universal Padding Schemes for RSA.- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent.- Information Theory and Secret Sharing.- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors.- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups.- Cipher Design and Analysis.- A Generalized Birthday Problem.- (Not So) Random Shuffles of RC4.- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.- Elliptic Curves and Abelian Varieties.- Supersingular Abelian Varieties in Cryptology.- Efficient Algorithms for Pairing-Based Cryptosystems.- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2.- Password-BasedAuthentication.- Threshold Password-Authenticated Key Exchange.- Distributed Cryptosystems.- A Threshold Pseudorandom Function Construction and Its Applications.- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products.- Pseudorandomness and Applications.- Hidden Number Problem with the Trace and Bit Security of XTR and LUC.- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security.- Variations on Signatures and Authentication.- Threshold Ring Signatures and Applications to Ad-hoc Groups.- Deniable Ring Authentication.- SiBIR: Signer-Base Intrusion-Resilient Signatures.- Stream Ciphers and Boolean Functions.- Cryptanalysis of Stream Ciphers with Linear Masking.- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers.- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction.- Commitment Schemes.- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks.- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor.- Signature Schemes.- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation.- Security Proof for Partial-Domain Hash Signature Schemes.
Erscheint lt. Verlag | 5.8.2002 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science |
Zusatzinfo | XIV, 630 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 233 mm |
Gewicht | 964 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • Algorithmic Number Theory • authentication • boolean function • Cryptoanalysis • cryptographic protocolls • cryptography • data encryption • Digital Signatures • Finite Field Computations • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Information • Information Theory • Multi-Party Computation • Public Key Cryptography • security • security privacy |
ISBN-10 | 3-540-44050-X / 354044050X |
ISBN-13 | 978-3-540-44050-5 / 9783540440505 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich