Advances in Cryptology -- ASIACRYPT 2006
Springer Berlin (Verlag)
978-3-540-49475-1 (ISBN)
Attacks on Hash Functions.- Finding SHA-1 Characteristics: General Results and Applications.- Improved Collision Search for SHA-0.- Forgery and Partial Key-Recovery Attacks on HMAC and NMAC Using Hash Collisions.- Stream Ciphers and Boolean Functions.- New Guess-and-Determine Attack on the Self-Shrinking Generator.- On the (In)security of Stream Ciphers Based on Arrays and Modular Addition.- Construction and Analysis of Boolean Functions of 2t+1 Variables with Maximum Algebraic Immunity.- Biometrics and ECC Computation.- Secure Sketch for Biometric Templates.- The 2-Adic CM Method for Genus 2 Curves with Application to Cryptography.- Extending Scalar Multiplication Using Double Bases.- ID-Based Schemes.- HIBE With Short Public Parameters Without Random Oracle.- Forward-Secure and Searchable Broadcast Encryption with Short Ciphertexts and Private Keys.- On the Generic Construction of Identity-Based Signatures with Additional Properties.- Public-Key Schemes.- On the Provable Security of an Efficient RSA-Based Pseudorandom Generator.- On the Security of OAEP.- Relationship Between Standard Model Plaintext Awareness and Message Hiding.- RSA and Factorization.- On the Equivalence of RSA and Factoring Regarding Generic Ring Algorithms.- Trading One-Wayness Against Chosen-Ciphertext Security in Factoring-Based Encryption.- A Strategy for Finding Roots of Multivariate Polynomials with New Applications in Attacking RSA Variants.- Construction of Hash Function.- Indifferentiable Security Analysis of Popular Hash Functions with Prefix-Free Padding.- Multi-Property-Preserving Hash Domain Extension and the EMD Transform.- Combining Compression Functions and Block Cipher-Based Hash Functions.- Protocols.- A Scalable Password-Based Group Key Exchange Protocol in the Standard Model.- AWeakness in Some Oblivious Transfer and Zero-Knowledge Protocols.- Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution.- Block Ciphers.- KFC - The Krazy Feistel Cipher.- Generic Attacks on Unbalanced Feistel Schemes with Contracting Functions.- New Cryptanalytic Results on IDEA.- Signatures.- New Approach for Selectively Convertible Undeniable Signature Schemes.- Simulation-Sound NIZK Proofs for a Practical Language and Constant Size Group Signatures.- Analysis of One Popular Group Signature Scheme.
Erscheint lt. Verlag | 22.11.2006 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XIV, 470 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 680 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | algorithm • Algorithm analysis and problem complexity • algorithms • anonymithy • biometrics • Block Ciphers • Calculus • Cryptanalysis • Cryptographic Attacks • cryptographic protocols • cryptography • Cryptology • Data Security • digital signature schemes • Elliptic Curves • Hash Functions • Information • Information Theory • privacy • Public Key Cryptography • rsa • security • Stream Ciphers • Variable |
ISBN-10 | 3-540-49475-8 / 3540494758 |
ISBN-13 | 978-3-540-49475-1 / 9783540494751 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich