Advances in Cryptology - ASIACRYPT 2004
Editat de Pil Joong Leeen Limba Engleză Paperback – 29 noi 2004
Preț: 391.05 lei
Puncte Express: 587
Preț estimativ în valută:
69.16€ • 81.100$ • 60.21£
69.16€ • 81.100$ • 60.21£
Carte tipărită la comandă
Livrare economică 30 martie-13 aprilie
Specificații
ISBN-13: 9783540239758
ISBN-10: 3540239758
Pagini: 568
Ilustrații: XVI, 548 p.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.85 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540239758
Pagini: 568
Ilustrații: XVI, 548 p.
Dimensiuni: 155 x 235 x 31 mm
Greutate: 0.85 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Block Ciphers.- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds.- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC.- Eliminating Random Permutation Oracles in the Even-Mansour Cipher.- Public Key Encryption.- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles.- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding.- Invited Talk I.- Stream Ciphers: Dead or Alive?.- Number Theory and Algebra.- On the Generalized Linear Equivalence of Functions Over Finite Fields.- Sieving Using Bucket Sort.- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups.- Secure Computation.- Practical Two-Party Computation Based on the Conditional Gate.- Privacy in Non-private Environments.- Asynchronous Proactive Cryptosystems Without Agreement.- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.- Hash Functions.- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions.- Higher Order Universal One-Way Hash Functions.- The MD2 Hash Function Is Not One-Way.- Key Management.- New Approaches to Password Authenticated Key Exchange Based on RSA.- Constant-Round Authenticated Group Key Exchange for Dynamic Groups.- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.- Identification.- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.- Secret Handshakes from CA-Oblivious Encryption.- k-Times Anonymous Authentication (Extended Abstract).- XL-Algorithms.- The XL-Algorithm and a Conjecture from Commutative Algebra.- Comparison Between XL and Gröbner Basis Algorithms.- Digital Signatures.-Generic Homomorphic Undeniable Signatures.- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings.- Public Key Cryptanalysis.- On the Security of MOR Public Key Cryptosystem.- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.- Invited Talk II.- Information Security in Korea IT839 Strategy.- Symmetric Key Cryptanalysis.- How Far Can We Go Beyond Linear Cryptanalysis?.- The Davies-Murphy Power Attack.- Time-Memory Trade-Off Attacks on Multiplications and T-Functions.- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0.- Protocols.- On Provably Secure Time-Stamping Schemes.- Strong Conditional Oblivious Transfer and Computing on Intervals.- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.