Topics in Cryptology -- CT-RSA 2004: The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings

Author:   Tatsuaki Okamoto
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Edition:   2004 ed.
Volume:   2964
ISBN:  

9783540209966


Pages:   392
Publication Date:   10 February 2004
Format:   Paperback
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Our Price $211.07 Quantity:  
Add to Cart

Share |

Topics in Cryptology -- CT-RSA 2004: The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings


Add your own review!

Overview

Full Product Details

Author:   Tatsuaki Okamoto
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Edition:   2004 ed.
Volume:   2964
Dimensions:   Width: 15.50cm , Height: 2.10cm , Length: 23.50cm
Weight:   1.250kg
ISBN:  

9783540209966


ISBN 10:   3540209964
Pages:   392
Publication Date:   10 February 2004
Audience:   College/higher education ,  Professional and scholarly ,  Postgraduate, Research & Scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   In Print   Availability explained
This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us.

Table of Contents

Symmetric Encryption.- Online Encryption Schemes: New Security Notions and Constructions.- Related-Key Attacks on Triple-DES and DESX Variants.- Design of AES Based on Dual Cipher and Composite Field.- Periodic Properties of Counter Assisted Stream Ciphers.- A Fast Correlation Attack via Unequal Error Correcting LDPC Codes.- Aymmetric Encryption.- k-Resilient Identity-Based Encryption in the Standard Model.- A Generic Construction for Intrusion-Resilient Public-Key Encryption.- Digital Signatures.- A Certificate-Based Signature Scheme.- Identity Based Undeniable Signatures.- Compressing Rabin Signatures.- Protocols.- A Key Recovery System as Secure as Factoring.- Server Assisted Signatures Revisited.- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt `95.- Universal Re-encryption for Mixnets.- Bit String Commitment Reductions with a Non-zero Rate.- Improving Robustness of PGP Keyrings by Conflict Detection.- Side-Channel Attacks.- Issues of Security with the Oswald-Aigner Exponentiation Algorithm.- Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness.- Self-Randomized Exponentiation Algorithms.- Hardwares.- Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems.- High-Speed Modular Multiplication.- Yet Another Sieving Device.- Mode of Operations.- A Parallelizable Enciphering Mode.- Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.- Hash and Hash Chains.- A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512.- Fast Verification of Hash Chains.- Visual Cryptography.- Almost Ideal Contrast Visual Cryptography with Reversing.- Ellictic Curve Cryptosystems.- Weak Fields for ECC.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List