Selected areas in cryptography : 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers

書誌事項

Selected areas in cryptography : 12th International Workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers

Bart Preneel, Stafford Tavares (eds.)

(Lecture notes in computer science, 3897)

Springer, c2006

大学図書館所蔵 件 / 15

この図書・雑誌をさがす

注記

Includes bibliographical references and index

内容説明・目次

内容説明

This book constitutes the thoroughly refereed post-proceedings of the 12th International Workshop on Selected Areas in Cryptography, SAC 2005, held in Canada in August 2005. The 25 revised full papers presented were carefully reviewed and selected from 96 submissions for inclusion in the book. The papers are organized in topical sections.

目次

Stream Ciphers I.- Conditional Estimators: An Effective Attack on A5/1.- Cryptanalysis of the F-FCSR Stream Cipher Family.- Fault Attacks on Combiners with Memory.- Block Ciphers.- New Observation on Camellia.- Proving the Security of AES Substitution-Permutation Network.- Modes of Operation.- An Attack on CFB Mode Encryption as Used by OpenPGP.- Parallelizable Authentication Trees.- Improved Time-Memory Trade-Offs with Multiple Data.- Public Key Cryptography.- A Space Efficient Backdoor in RSA and Its Applications.- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism.- Stream Ciphers II.- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners.- Rekeying Issues in the MUGI Stream Cipher.- Key Establishment Protocols and Access Control.- Tree-Based Key Distribution Patterns.- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves.- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security.- Hash Functions.- Breaking a New Hash Function Design Strategy Called SMASH.- Analysis of a SHA-256 Variant.- Impact of Rotations in SHA-1 and Related Hash Functions.- Protocols for RFID Tags.- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags.- Reducing Time Complexity in RFID Systems.- Efficient Implementations.- Accelerated Verification of ECDSA Signatures.- Pairing-Friendly Elliptic Curves of Prime Order.- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving.- SPA Resistant Left-to-Right Integer Recodings.- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

  • NII書誌ID(NCID)
    BA76507910
  • ISBN
    • 3540331085
  • LCCN
    2006922554
  • 出版国コード
    gw
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Berlin
  • ページ数/冊数
    xi, 369 p.
  • 大きさ
    24 cm
  • 親書誌ID
ページトップへ