|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Tatsuaki OkamotoPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Edition: 2004 ed. Volume: 2964 Dimensions: Width: 15.50cm , Height: 2.10cm , Length: 23.50cm Weight: 1.250kg ISBN: 9783540209966ISBN 10: 3540209964 Pages: 392 Publication Date: 10 February 2004 Audience: College/higher education , Professional and scholarly , Postgraduate, Research & Scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: In Print ![]() This item will be ordered in for you from one of our suppliers. Upon receipt, we will promptly dispatch it out to you. For in store availability, please contact us. Table of ContentsSymmetric Encryption.- Online Encryption Schemes: New Security Notions and Constructions.- Related-Key Attacks on Triple-DES and DESX Variants.- Design of AES Based on Dual Cipher and Composite Field.- Periodic Properties of Counter Assisted Stream Ciphers.- A Fast Correlation Attack via Unequal Error Correcting LDPC Codes.- Aymmetric Encryption.- k-Resilient Identity-Based Encryption in the Standard Model.- A Generic Construction for Intrusion-Resilient Public-Key Encryption.- Digital Signatures.- A Certificate-Based Signature Scheme.- Identity Based Undeniable Signatures.- Compressing Rabin Signatures.- Protocols.- A Key Recovery System as Secure as Factoring.- Server Assisted Signatures Revisited.- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt `95.- Universal Re-encryption for Mixnets.- Bit String Commitment Reductions with a Non-zero Rate.- Improving Robustness of PGP Keyrings by Conflict Detection.- Side-Channel Attacks.- Issues of Security with the Oswald-Aigner Exponentiation Algorithm.- Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness.- Self-Randomized Exponentiation Algorithms.- Hardwares.- Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems.- High-Speed Modular Multiplication.- Yet Another Sieving Device.- Mode of Operations.- A Parallelizable Enciphering Mode.- Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.- Hash and Hash Chains.- A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512.- Fast Verification of Hash Chains.- Visual Cryptography.- Almost Ideal Contrast Visual Cryptography with Reversing.- Ellictic Curve Cryptosystems.- Weak Fields for ECC.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |