Advances in Cryptology - CRYPTO 2004
Editat de Matt Franklinen Limba Engleză Paperback – 4 aug 2004
Preț: 637.05 lei
Preț vechi: 796.31 lei
-20%
Puncte Express: 956
Preț estimativ în valută:
112.74€ • 131.76$ • 97.88£
112.74€ • 131.76$ • 97.88£
Carte tipărită la comandă
Livrare economică 19 februarie-05 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540226680
ISBN-10: 3540226680
Pagini: 596
Ilustrații: XI, 582 p.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.89 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540226680
Pagini: 596
Ilustrații: XI, 582 p.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.89 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Linear Cryptanalysis.- On Multiple Linear Approximations.- Feistel Schemes and Bi-linear Cryptanalysis.- Group Signatures.- Short Group Signatures.- Signature Schemes and Anonymous Credentials from Bilinear Maps.- Foundations.- Complete Classification of Bilinear Hard-Core Functions.- Finding Collisions on a Public Road, or Do Secure Hash Functions Need Secret Coins?.- Security of Random Feistel Schemes with 5 or More Rounds.- Efficient Representations.- Signed Binary Representations Revisited.- Compressed Pairings.- Asymptotically Optimal Communication for Torus-Based Cryptography.- How to Compress Rabin Ciphertexts and Signatures (and More).- Public Key Cryptanalysis.- On the Bounded Sum-of-Digits Discrete Logarithm Problem in Finite Fields.- Computing the RSA Secret Key Is Deterministic Polynomial Time Equivalent to Factoring.- Zero-Knowledge.- Multi-trapdoor Commitments and Their Applications to Proofs of Knowledge Secure Under Concurrent Man-in-the-Middle Attacks.- Constant-Round Resettable Zero Knowledge with Concurrent Soundness in the Bare Public-Key Model.- Zero-Knowledge Proofs and String Commitments Withstanding Quantum Attacks.- The Knowledge-of-Exponent Assumptions and 3-Round Zero-Knowledge Protocols.- Hash Collisions.- Near-Collisions of SHA-0.- Multicollisions in Iterated Hash Functions. Application to Cascaded Constructions.- Secure Computation.- Adaptively Secure Feldman VSS and Applications to Universally-Composable Threshold Cryptography.- Round-Optimal Secure Two-Party Computation.- Invited Talk.- Security, Liberty, and Electronic Communications.- Stream Cipher Cryptanalysis.- An Improved Correlation Attack Against Irregular Clocked and Filtered Keystream Generators.- Rewriting Variables: The Complexity of Fast Algebraic Attacks on Stream Ciphers.-Faster Correlation Attack on Bluetooth Keystream Generator E0.- Public Key Encryption.- A New Paradigm of Hybrid Encryption Scheme.- Secure Identity Based Encryption Without Random Oracles.- Bounded Storage Model.- Non-interactive Timestamping in the Bounded Storage Model.- Key Management.- IPAKE: Isomorphisms for Password-Based Authenticated Key Exchange.- Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes.- Efficient Tree-Based Revocation in Groups of Low-State Devices.- Computationally Unbounded Adversaries.- Privacy-Preserving Datamining on Vertically Partitioned Databases.- Optimal Perfectly Secure Message Transmission.- Pseudo-signatures, Broadcast, and Multi-party Computation from Correlated Randomness.
Caracteristici
Includes supplementary material: sn.pub/extras