Progress in Cryptology – INDOCRYPT 2007 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings /

Na minha lista:
Detalhes bibliográficos
Autor Corporativo: SpringerLink (Online service)
Outros Autores: Srinathan, K. (Editor, http://id.loc.gov/vocabulary/relators/edt), Pandu Rangan, C. (Editor, http://id.loc.gov/vocabulary/relators/edt), Yung, Moti. (Editor, http://id.loc.gov/vocabulary/relators/edt)
Formato: Recurso Electrónico livro electrónico
Idioma:English
Publicado em: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2007.
Edição:1st ed. 2007.
Colecção:Security and Cryptology ; 4859
Assuntos:
Acesso em linha:https://doi.org/10.1007/978-3-540-77026-8
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
Sumário:
  • Hashing
  • Linearization Attacks Against Syndrome Based Hashes
  • A Meet-in-the-Middle Collision Attack Against the New FORK-256
  • Multilane HMAC— Security beyond the Birthday Limit
  • Elliptic Curve
  • On the Bits of Elliptic Curve Diffie-Hellman Keys
  • A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography
  • Cryptoanalysis
  • Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses
  • Related-Key Differential-Linear Attacks on Reduced AES-192
  • Improved Meet-in-the-Middle Attacks on Reduced-Round DES
  • Information Theoretic Security
  • Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality
  • Secret Swarm Unit Reactive k??Secret Sharing
  • Elliptic Curve Cryptography
  • New Formulae for Efficient Elliptic Curve Arithmetic
  • A Graph Theoretic Analysis of Double Base Number Systems
  • Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication
  • Signature
  • Transitive Signatures from Braid Groups
  • Proxy Re-signature Schemes Without Random Oracles
  • Side Channel Attack
  • First-Order Differential Power Analysis on the Duplication Method
  • Solving Discrete Logarithms from Partial Knowledge of the Key
  • Symmetric Cryptosystem
  • New Description of SMS4 by an Embedding overGF(28)
  • Tweakable Enciphering Schemes from Hash-Sum-Expansion
  • A Framework for Chosen IV Statistical Analysis of Stream Ciphers
  • Asymmetric Cryptosystem
  • Public Key Encryption with Searchable Keywords Based on Jacobi Symbols
  • A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power
  • Short Presentation
  • Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues
  • On the k-Operation Linear Complexity of Periodic Sequences
  • Trade-Off Traitor Tracing
  • X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs
  • Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System
  • Extended Multi-Property-Preserving and ECM-Construction
  • Design of a Differential Power Analysis Resistant Masked AES S-Box
  • LFSR Based Stream Ciphers Are Vulnerable to Power Attacks
  • An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions
  • Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function
  • Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.