Information Security and Privacy: 15th Australasian Conference, ACISP 2010, Sydney, Australia, July 5-7, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6168

Editat de Ron Steinfeld, Philip Hawkes
en Limba Engleză Paperback – 17 iun 2010

Din seria Lecture Notes in Computer Science

Preț: 30557 lei

Preț vechi: 38197 lei

Puncte Express: 458

Preț estimativ în valută:
5850 6335$ 4986£

Carte disponibilă

Livrare economică 17 iunie-01 iulie

Preluare comenzi: 021 569.72.76


ISBN-13: 9783642140808
ISBN-10: 3642140807
Pagini: 403
Ilustrații: XII, 403 p. 40 illus.
Greutate: 0.64 kg
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă



Symmetric Key Encryption.- Cryptanalysis of a Generalized Unbalanced Feistel Network Structure.- Improved Algebraic Cryptanalysis of QUAD, Bivium and Trivium via Graph Partitioning on Equation Systems.- On Multidimensional Linear Cryptanalysis.- Side-Channel Analysis of the K2 Stream Cipher.- On Unbiased Linear Approximations.- Hash Functions.- Distinguishers for the Compression Function and Output Transformation of Hamsi-256.- Second-Preimage Analysis of Reduced SHA-1.- Some Observations on Indifferentiability.- Public Key Cryptography.- Adaptive and Composable Non-committing Encryptions.- Relations among Notions of Complete Non-malleability: Indistinguishability Characterisation and Efficient Construction without Random Oracles.- Strong Knowledge Extractors for Public-Key Encryption Schemes.- A Multi-trapdoor Commitment Scheme from the RSA Assumption.- Identity-Based Chameleon Hash Scheme without Key Exposure.- The Security Model of Unidirectional Proxy Re-Signature with Private Re-Signature Key.- Security Estimates for Quadratic Field Based Cryptosystems.- Solving Generalized Small Inverse Problems.- Protocols.- One-Time-Password-Authenticated Key Exchange.- Predicate-Based Key Exchange.- Attribute-Based Authenticated Key Exchange.- Optimally Tight Security Proofs for Hash-Then-Publish Time-Stamping.- Additive Combinatorics and Discrete Logarithm Based Range Protocols.- Proof-of-Knowledge of Representation of Committed Value and Its Applications.- Network Security.- Pattern Recognition Techniques for the Classification of Malware Packers.- Repelling Sybil-Type Attacks in Wireless Ad Hoc Systems.