|  |
 |
| Artikel-Nr.: 858A-9783540206095 Herst.-Nr.: 9783540206095 EAN/GTIN: 9783540206095 |
| |
|
|  |  |
 | Invited Talks.- Linear Complexity and Related Complexity Measures for Sequences.- Forensic Computing.- Stream Cipher.- Hiji-bij-bij: A New Stream Cipher with a Self-synchronizing Mode of Operation.- Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator.- Block Cipher.- Nonlinearity Properties of the Mixing Operations of the Block Cipher IDEA.- Impossible Differential Cryptanalysis for Block Cipher Structures.- Impossible Differential Attack on 30-Round SHACAL-2.- Boolean Function.- Construction of Perfect Nonlinear and Maximally Nonlinear Multi-output Boolean Functions Satisfying Higher Order Strict Avalanche Criteria.- Improved Cost Function in the Design of Boolean Functions Satisfying Multiple Criteria.- Secrect Sharing.- On Multiplicative Linear Secret Sharing Schemes.- A New (2,n)-Visual Threshold Scheme for Color Images.- On the Power of Computational Secret Sharing.- Bilinear Pairing.- Identity-Based Broadcasting.- Efficient Verifiably Encrypted Signature and Partially Blind Signature from Bilinear Pairings.- Extending Joux's Protocol to Multi Party Key Agreement.- Public Key.- Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Prime Numbers of Diffie-Hellman Groups for IKE-MODP.- Polynomial Equivalence Problems and Applications to Multivariate Cryptosystems.- Signature Scheme.- Security Analysis of Several Group Signature Schemes.- Forking Lemmas for Ring Signature Schemes.- Protocol.- Practical Mental Poker Without a TTP Based on Homomorphic Encryption.- Lightweight Mobile Credit-Card Payment Protocol.- Elliptic Curve & Algebraic Geometry.- On the Construction of Prime Order Elliptic Curves.- Counting Points on an Abelian Variety over a Finite Field.- Implementation & Digital Watermarking.- Side ChannelAttack on Ha-Moon's Countermeasure of Randomized Signed Scalar Multiplication.- Systolic and Scalable Architectures for Digit-Serial Multiplication in Fields GF(p m ).- Cryptanalysis of Block Based Spatial Domain Watermarking Schemes.- Authentication.- More Efficient Password Authenticated Key Exchange Based on RSA.- A Password-Based Authenticator: Security Proof and Applications.- Stronger Security Bounds for OMAC, TMAC, and XCBC.- Progressive Verification: The Case of Message Authentication. Weitere Informationen:  |  | Author: | Thomas Johansson; Subhamoy Maitra | Verlag: | Springer Berlin | Sprache: | eng |
|
|  |  |
 | |  |  |
 | Weitere Suchbegriffe: allgemeine Informatikbücher - englischsprachig, allgemeine informatikbücher - englischsprachig, Kryptologie, Boolean function, authentication, computational number theory, cryptanalysis, cryptographic protocols, cryptography, cryptology, cryptosystems, digital signatures, finite field computations |
|  |  |
| |