Security in Communication Networks
Springer Berlin (Verlag)
978-3-540-24301-4 (ISBN)
Invited Talk.- ECRYPT: The Cryptographic Research Challenges for the Next Decade.- Reduction of Security/Primitives.- Relationships Between Diffie-Hellman and "Index Oracles".- On the Security Notions for Public-Key Encryption Schemes.- Efficient Unconditional Oblivious Transfer from Almost Any Noisy Channel.- Signature Schemes.- A Provably Secure Short Transitive Signature Scheme from Bilinear Group Pairs.- Group Signatures with Separate and Distributed Authorities.- Threshold Cryptography in Mobile Ad Hoc Networks.- Anonymity and Privacy.- Designated Verifier Signatures: Anonymity and Efficient Construction from Any Bilinear Map.- Group Signatures: Better Efficiency and New Theoretical Aspects.- Efficient Blind Signatures Without Random Oracles.- Authentication and Identification.- Minimalist Cryptography for Low-Cost RFID Tags (Extended Abstract).- On the Key Exposure Problem in Chameleon Hashes.- Zero Knowledge.- Identity-Based Zero-Knowledge.- Public Key Cryptosystems.- A Robust Multisignature Scheme with Applications to Acknowledgement Aggregation.- Efficient Key Encapsulation to Multiple Parties.- Improved Signcryption from q-Diffie-Hellman Problems.- Distributed Cryptography.- Colored Visual Cryptography Without Color Darkening.- On the Size of Monotone Span Programs.- Universally Composable DKG with Linear Number of Exponentiations.- Cryptanalysis of Public Key Cryptosystems.- An Algebraic Approach to NTRU (q = 2 n ) via Witt Vectors and Overdetermined Systems of Nonlinear Equations.- Efficient Cryptanalysis of RSE(2)PKC and RSSE(2)PKC.- Cryptanalysis.- The Decimated Sample Based Improved Algebraic Attacks on the Nonlinear Filters.- Non-randomness of the Full 4 and 5-Pass HAVAL.- Email Security.- Controlling Spam by Secure Internet Content Selection.- KeyDistribution and Feedback Shift Registers.- On Session Identifiers in Provably Secure Protocols.- How to Embed Short Cycles into Large Nonlinear Feedback-Shift Registers.
Erscheint lt. Verlag | 2.2.2005 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XII, 388 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 558 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | Algorithm analysis and problem complexity • anonymity • authentication • Communication • Cryptoanalysis • cryptographic protocols • cryptography • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identity • Network Security • Oracle • privacy • Public Key Cryptography • Secret Sharing • Secure Communications • Secure Networking • security • security protocols • session • SIGNATUR • web service security • Zero Knowledge |
ISBN-10 | 3-540-24301-1 / 3540243011 |
ISBN-13 | 978-3-540-24301-4 / 9783540243014 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich