Cryptology and Network Security
Cryptosystems.- Chosen-Ciphertext Secure Proxy Re-encryption without Pairings.- Hybrid Damgård Is CCA1-Secure under the DDH Assumption.- Efficient Dynamic Broadcast Encryption and Its Extension to Authenticated Dynamic Broadcast Encryption.- Cryptanalysis of Short Exponent RSA with Primes Sharing Least Significant Bits.- Signatures.- Efficient and Short Certificateless Signature.- Sanitizable Signatures Revisited.- An Efficient On-Line/Off-Line Signature Scheme without Random Oracles.- On the Security of Online/Offline Signatures and Multisignatures from ACISP'06.- Identification, Authentication and Key Management.- A Killer Application for Pairings: Authenticated Key Establishment in Underwater Wireless Sensor Networks.- Anonymous and Transparent Gateway-Based Password-Authenticated Key Exchange.- Cryptanalysis of EC-RAC, a RFID Identification Protocol.- Cryptographic Algorithms and Protocols.- Counting Method for Multi-party Computation over Non-abelian Groups.- Keyword Field-Free Conjunctive Keyword Searches on Encrypted Data and Extension for Dynamic Groups.- Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes.- Black-Box Constructions for Fully-Simulatable Oblivious Transfer Protocols.- Skew Frobenius Map and Efficient Scalar Multiplication for Pairing-Based Cryptography.- Stream Ciphers and Block Ciphers.- Cryptanalysis of MV3 Stream Cipher.- 3D: A Three-Dimensional Block Cipher.- Cryptographic Foundations.- Construction of Resilient Functions with Multiple Cryptographic Criteria.- Enumeration of Homogeneous Rotation Symmetric Functions over F p .- Unconditionally Reliable Message Transmission in Directed Hypergraphs.- Applications and Implementations.- An Open Framework for Remote Electronic Elections.- Conditional Payments forComputing Markets.- High-Speed Search System for PGP Passphrases.- Workload Characterization of a Lightweight SSL Implementation Resistant to Side-Channel Attacks.- Security in Ad Hoc Networks and Wireless Sensor Networks.- Authenticated Directed Diffusion.- A New Message Recognition Protocol for Ad Hoc Pervasive Networks.
| Erscheint lt. Verlag | 13.11.2008 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIII, 395 p. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 621 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | ad hoc networks • aes • Algorithm analysis and problem complexity • anonymity • authentication • Block Ciphers • Cryptanalysis • cryptographic protocols • cryptography • digital signature • DoS attacks • Elliptic Curve Cryptography • Encryption • group signatures • Hardcover, Softcover / Informatik, EDV/Informatik • HC/Informatik, EDV/Informatik • Identification • Intrusion Detection • Key Management • linear structure • minimal function • multiparty computation • Network Security • nonlinearity • pairings • provable security • public key encryption • Recognition • Reputation • RFID • RFID (Radio Frequency Identificatio) • rsa • secure computation • secure proxy • security • sensor networks • signature schemes • signcryption • Stream Ciphers • trust management • wireless sensor networks |
| ISBN-13 | 9783540896401 / 9783540896401 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich