|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: K. Srinathan , C. Pandu Rangan , Moti YungPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2007 ed. Volume: 4859 Dimensions: Width: 15.50cm , Height: 2.20cm , Length: 23.50cm Weight: 0.670kg ISBN: 9783540770251ISBN 10: 3540770259 Pages: 428 Publication Date: 16 November 2007 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsHashing.- Linearization Attacks Against Syndrome Based Hashes.- A Meet-in-the-Middle Collision Attack Against the New FORK-256.- Multilane HMAC— Security beyond the Birthday Limit.- Elliptic Curve.- On the Bits of Elliptic Curve Diffie-Hellman Keys.- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography.- Cryptoanalysis.- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.- Related-Key Differential-Linear Attacks on Reduced AES-192.- Improved Meet-in-the-Middle Attacks on Reduced-Round DES.- Information Theoretic Security.- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality.- Secret Swarm Unit Reactive k??Secret Sharing.- Elliptic Curve Cryptography.- New Formulae for Efficient Elliptic Curve Arithmetic.- A Graph Theoretic Analysis of Double Base Number Systems.- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication.- Signature.- Transitive Signatures from Braid Groups.- Proxy Re-signature Schemes Without Random Oracles.- Side Channel Attack.- First-Order Differential Power Analysis on the Duplication Method.- Solving Discrete Logarithms from Partial Knowledge of the Key.- Symmetric Cryptosystem.- New Description of SMS4 by an Embedding overGF(28).- Tweakable Enciphering Schemes from Hash-Sum-Expansion.- A Framework for Chosen IV Statistical Analysis of Stream Ciphers.- Asymmetric Cryptosystem.- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols.- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.- Short Presentation.- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues.- On the k-Operation Linear Complexity of PeriodicSequences.- Trade-Off Traitor Tracing.- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs.- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.- Extended Multi-Property-Preserving and ECM-Construction.- Design of a Differential Power Analysis Resistant Masked AES S-Box.- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks.- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function.- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |