Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings

Author:   Josef Pieprzyk
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Volume:   5985
ISBN:  

9783642119248


Pages:   397
Publication Date:   02 March 2010
Format:   Paperback
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Our Price $250.80 Quantity:  
Add to Cart

Share |

Topics in Cryptology - CT-RSA 2010: The 10th Cryptographers' Track at the RSA Conference 2010, San Francisco, CA, USA, March 1-5, 2010. Proceedings


Add your own review!

Overview

Full Product Details

Author:   Josef Pieprzyk
Publisher:   Springer-Verlag Berlin and Heidelberg GmbH & Co. KG
Imprint:   Springer-Verlag Berlin and Heidelberg GmbH & Co. K
Volume:   5985
Dimensions:   Width: 15.70cm , Height: 2.50cm , Length: 23.60cm
Weight:   0.635kg
ISBN:  

9783642119248


ISBN 10:   3642119247
Pages:   397
Publication Date:   02 March 2010
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Out of stock   Availability explained
The supplier is temporarily out of stock of this item. It will be ordered for you on backorder and shipped when it becomes available.

Table of Contents

Invited Talk.- The First 30 Years of Cryptographic Hash Functions and the NIST SHA-3 Competition.- Public-Key Cryptography.- Errors Matter: Breaking RSA-Based PIN Encryption with Thirty Ciphertext Validity Queries.- Efficient CRT-RSA Decryption for Small Encryption Exponents.- Resettable Public-Key Encryption: How to Encrypt on a Virtual Machine.- Plaintext-Awareness of Hybrid Encryption.- Speed Records for NTRU.- High-Speed Parallel Software Implementation of the ? T Pairing.- Refinement of Miller's Algorithm Over Edwards Curves.- Probabilistic Public Key Encryption with Equality Test.- Efficient CCA-Secure PKE from Identity-Based Techniques.- Anonymity from Asymmetry: New Constructions for Anonymous HIBE.- Making the Diffie-Hellman Protocol Identity-Based.- On Extended Sanitizable Signature Schemes.- Side-Channel Attacks.- Unrolling Cryptographic Circuits: A Simple Countermeasure Against Side-Channel Attacks.- Fault Attacks Against emv Signatures.- Revisiting Higher-Order DPA Attacks:.- Differential Cache-Collision Timing Attacks on AES with Applications to Embedded CPUs.- Cryptographic Protocols.- Usable Optimistic Fair Exchange.- Hash Function Combiners in TLS and SSL.- Improving Efficiency of an `On the Fly' Identification Scheme by Perfecting Zero-Knowledgeness.- Cryptanalysis.- Linear Cryptanalysis of Reduced-Round PRESENT.- Dependent Linear Approximations: The Algorithm of Biryukov and Others Revisited.- Practical Key Recovery Attack against Secret-IV Edon- .- Rebound Attacks on the Reduced Grostl Hash Function.- Symmetric Cryptography.- The Sum of CBC MACs Is a Secure PRF.- On Fast Verification of Hash Chains.

Reviews

Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

MRG2025CC

 

Shopping Cart
Your cart is empty
Shopping cart
Mailing List