Security and Cryptography for Networks
Springer Berlin (Verlag)
9783540858546 (ISBN)
- Lieferbar
- Versandkostenfrei
- Auch auf Rechnung
- Artikel merken
Invited Talk.- Storage Encryption: A Cryptographer's View.- Session 1: Implementations.- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries.- CLL: A Cryptographic Link Layer for Local Area Networks.- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification.- Session 2: Protocols I.- Privacy Preserving Data Mining within Anonymous Credential Systems.- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function.- Session 3: Encryption I.- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications.- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption.- Session 4: Encryption II.- General Certificateless Encryption and Timed-Release Encryption.- Efficient Certificate-Based Encryption in the Standard Model.- Session 5: Primitives.- An Improved Robust Fuzzy Extractor.- On Linear Secret Sharing for Connectivity in Directed Graphs.- Session 6: Signatures.- Expressive Subgroup Signatures.- Anonymous Proxy Signatures.- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem.- Session 7: Hardware and Cryptanalysis.- Using Normal Bases for Compact Hardware Implementations of the AES S-Box.- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes.- Full Cryptanalysis of LPS and Morgenstern Hash Functions.- A New DPA Countermeasure Based on Permutation Tables.- Session 8: Protocols II.- Simplified Submission of Inputs to Protocols.- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited.- Session 9: Encryption III.- Linear Bandwidth Naccache-Stern Encryption.- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment.- ConstructingStrong KEM from Weak KEM (or How to Revive the KEM/DEM Framework).- Session 10: Key Exchange.- New Anonymity Notions for Identity-Based Encryption.- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort.- An Identity-Based Key Agreement Protocol for the Network Layer.
| Erscheint lt. Verlag | 28.8.2008 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XI, 423 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Advanced Encryption Standard • aes • Algorithm analysis and problem complexity • anonymity • Communication Security • Cryptanalysis • cryptography • Cryptology • DES • digital signature schemes • Distributed Systems Security • Efficiency • Elliptic Curve Cryptography • embedded cryptography • Error Probability • group signatures • Hardcover, Softcover / Informatik, EDV/Informatik • Hardware Implementation • HC/Informatik, EDV/Informatik • information theoretic security • multiparty computation • Network Security • Padding • privacy • probabilistic encryption • Public Key Cryptography • RFID tags • S-box • secure communication • Secure Networking • session ID generation • standard model |
| ISBN-13 | 9783540858546 / 9783540858546 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich