Progress in Cryptology - AFRICACRYPT 2008
Springer Berlin (Verlag)
978-3-540-68159-5 (ISBN)
AES.- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds.- Implementation of the AES-128 on Virtex-5 FPGAs.- Analysis of RFID Protocols.- Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol.- Differential Cryptanalysis of Reduced-Round PRESENT.- Invited Talk.- The Psychology of Security.- Cryptographic Protocols.- An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees.- Robust Threshold Schemes Based on the Chinese Remainder Theorem.- An Authentication Protocol with Encrypted Biometric Data.- Authentication.- Authenticated Encryption Mode for Beyond the Birthday Bound Security.- Cryptanalysis of the TRMS Signature Scheme of PKC'05.- Public-Key Cryptography.- New Definition of Density on Knapsack Cryptosystems.- Another Generalization of Wiener's Attack on RSA.- An Adaptation of the NICE Cryptosystem to Real Quadratic Orders.- Pseudorandomness.- A Proof of Security in O(2 n ) for the Benes Scheme.- Analysis of Stream Ciphers.- Yet Another Attack on Vest.- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers.- Correlated Keystreams in Moustique.- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State.- Analysis of Grain's Initialization Algorithm.- Hash Functions.- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function.- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions?.- Broadcast Encryption.- Attribute-Based Broadcast Encryption Scheme Made Efficient.- Lower Bounds for Subset Cover Based Broadcast Encryption.- Invited Talk.- A Brief History of Provably-Secure Public-Key Encryption.- Implementation.- On Compressible Pairings and Their Computation.- Twisted Edwards Curves.- EfficientMultiplication in , m???1 and 5???????18.
Erscheint lt. Verlag | 27.5.2008 |
---|---|
Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
Zusatzinfo | XI, 420 p. |
Verlagsort | Berlin |
Sprache | englisch |
Maße | 155 x 235 mm |
Gewicht | 658 g |
Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
Schlagworte | aes • Algorithm analysis and problem complexity • anonymity • authenticated encryption • authentication • biometrics • block cipher • broadcast encryption • crpytographic protocols • Cryptanalysis • cryptography • cypher implementation • DES • Elliptic Curves • Fourier transform • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • keyed hash functions • pairing-b • pairing-based cryptography • privacy • pseudorandom function • Radio-Frequency Identification (RFID) • RFID • RFID (Radio Frequency Identificatio) • Rijndael attacks • Robustness • rsa • security • side channel attacks • signature schemes • Stream Ciphers • Systems Security • threshold cryptography |
ISBN-10 | 3-540-68159-0 / 3540681590 |
ISBN-13 | 978-3-540-68159-5 / 9783540681595 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich