|
![]() |
|||
|
||||
OverviewFull Product DetailsAuthor: Josef PieprzykPublisher: Springer-Verlag Berlin and Heidelberg GmbH & Co. KG Imprint: Springer-Verlag Berlin and Heidelberg GmbH & Co. K Volume: 5985 Dimensions: Width: 15.70cm , Height: 2.50cm , Length: 23.60cm Weight: 0.635kg ISBN: 9783642119248ISBN 10: 3642119247 Pages: 397 Publication Date: 02 March 2010 Audience: Professional and scholarly , Professional & Vocational Format: Paperback Publisher's Status: Active Availability: Out of stock ![]() The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available. Table of ContentsInvited Talk.- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition.- Public-Key Cryptography.- Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.- Efficient CRT-RSA Decryption for Small Encryption Exponents.- Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.- Plaintext-Awareness of Hybrid Encryption.- Speed Records for NTRU.- High-Speed Parallel Software Implementation of the ? T Pairing.- Refinement of Miller's Algorithm Over Edwards Curves.- Probabilistic Public Key Encryption with Equality Test.- Efficient CCA-Secure PKE from Identity-Based Techniques.- Anonymity from Asymmetry: New Constructions for Anonymous HIBE.- Making the Diffie-Hellman Protocol Identity-Based.- On Extended Sanitizable Signature Schemes.- Side-Channel Attacks.- Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks.- Fault Attacks Against emv Signatures.- Revisiting Higher-Order DPA Attacks:.- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.- Cryptographic Protocols.- Usable Optimistic Fair Exchange.- Hash Function Combiners in TLS and SSL.- Improving Efficiency of an `On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.- Cryptanalysis.- Linear Cryptanalysis of Reduced-Round PRESENT.- Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited.- Practical Key Recovery Attack against Secret-IV Edon- .- Rebound Attacks on the Reduced Grostl Hash Function.- Symmetric Cryptography.- The Sum of CBC MACs Is a Secure PRF.- On Fast Verification of Hash Chains.ReviewsAuthor InformationTab Content 6Author Website:Countries AvailableAll regions |