Bültmann & Gerriets
Topics in Cryptology - CT-RSA 2007
The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings
von Masayuki Abe
Verlag: Springer Berlin Heidelberg
Reihe: Lecture Notes in Computer Science Nr. 4377
Reihe: Security and Cryptology
E-Book / PDF
Kopierschutz: PDF mit Wasserzeichen

Hinweis: Nach dem Checkout (Kasse) wird direkt ein Link zum Download bereitgestellt. Der Link kann dann auf PC, Smartphone oder E-Book-Reader ausgeführt werden.
E-Books können per PayPal bezahlt werden. Wenn Sie E-Books per Rechnung bezahlen möchten, kontaktieren Sie uns bitte.

ISBN: 978-3-540-69328-4
Auflage: 2006
Erschienen am 07.02.2007
Sprache: Englisch
Umfang: 403 Seiten

Preis: 53,49 €

53,49 €
merken
zum Hardcover 53,49 €
Inhaltsverzeichnis
Klappentext

Symmetric-Key Encryption.- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.- A Simple Related-Key Attack on the Full SHACAL-1.- Signatures and Authentication.- Impossibility Proofs for RSA Signatures in the Standard Model.- Selecting Secure Passwords.- Human Identification Through Image Evaluation Using Secret Predicates.- Hash Functions.- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.- Second Preimages for SMASH.- Digital Signatures (I).- A Practical Optimal Padding for Signature Schemes.- Directed Transitive Signature Scheme.- Identity-Based Multi-signatures from RSA.- Cryptographic Protocols (I).- Improved Efficiency for Private Stable Matching.- Compact E-Cash from Bounded Accumulator.- Batch Processing of Interactive Proofs.- Side-Channel Attacks (I).- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.- Predicting Secret Keys Via Branch Prediction.- Side-Channel Attacks (II).- Template Attacks on Masking-Resistance Is Futile.- Differential Power Analysis of Stream Ciphers.- Cache Based Remote Timing Attack on the AES.- Cryptographic Protocols (II).- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.- Efficient Password-Authenticated Key Exchange Based on RSA.- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.- Digital Signatures (II).- A Practical and Tightly Secure Signature Scheme Without Hash Function.- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.- Efficient Implementation.- Public Key Cryptography and RFID Tags.- A Bit-Slice Implementation of the Whirlpool Hash Function.



This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held in San Francisco, CA, USA in February 2007. The 25 revised full papers presented together with two invited papers were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections.


andere Formate
weitere Titel der Reihe