Topics in Cryptology - CT-RSA 2007
Editat de Masayuki Abeen Limba Engleză Paperback – 22 dec 2006
Preț: 327.28 lei
Preț vechi: 409.10 lei
-20% Nou
Puncte Express: 491
Preț estimativ în valută:
57.91€ • 67.46$ • 50.57£
57.91€ • 67.46$ • 50.57£
Carte tipărită la comandă
Livrare economică 19 ianuarie-02 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540693277
ISBN-10: 3540693270
Pagini: 420
Ilustrații: XI, 403 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.63 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540693270
Pagini: 420
Ilustrații: XI, 403 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.63 kg
Ediția:2006
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Symmetric-Key Encryption.- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.- A Simple Related-Key Attack on the Full SHACAL-1.- Signatures and Authentication.- Impossibility Proofs for RSA Signatures in the Standard Model.- Selecting Secure Passwords.- Human Identification Through Image Evaluation Using Secret Predicates.- Hash Functions.- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.- Second Preimages for SMASH.- Digital Signatures (I).- A Practical Optimal Padding for Signature Schemes.- Directed Transitive Signature Scheme.- Identity-Based Multi-signatures from RSA.- Cryptographic Protocols (I).- Improved Efficiency for Private Stable Matching.- Compact E-Cash from Bounded Accumulator.- Batch Processing of Interactive Proofs.- Side-Channel Attacks (I).- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.- Predicting Secret Keys Via Branch Prediction.- Side-Channel Attacks (II).- Template Attacks on Masking—Resistance Is Futile.- Differential Power Analysis of Stream Ciphers.- Cache Based Remote Timing Attack on the AES.- Cryptographic Protocols (II).- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.- Efficient Password-Authenticated Key Exchange Based on RSA.- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.- Digital Signatures (II).- A Practical and Tightly Secure Signature Scheme Without Hash Function.- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.- Efficient Implementation.- Public Key Cryptography and RFID Tags.- A Bit-Slice Implementation of the Whirlpool Hash Function.