Topics in Cryptology - CT-RSA 2007 : the Cryptographers' Track at the RSA Conference 2007 San Fancisco, CA, USA, February 5-9, 2007 : proceedings

書誌事項

Topics in Cryptology - CT-RSA 2007 : the Cryptographers' Track at the RSA Conference 2007 San Fancisco, CA, USA, February 5-9, 2007 : proceedings

Masayuki Abe (ed.)

(Lecture notes in computer science, 4377)

Springer, c2006

大学図書館所蔵 件 / 13

この図書・雑誌をさがす

注記

Includes bibliographical references and index

内容説明・目次

内容説明

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2007, CT-RSA 2007, held in San Francisco, CA, USA in February 2007. The 25 revised full papers presented together with two invited papers were carefully reviewed and selected from 73 submissions. The papers are organized in topical sections.

目次

Symmetric-Key Encryption.- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers.- A Simple Related-Key Attack on the Full SHACAL-1.- Signatures and Authentication.- Impossibility Proofs for RSA Signatures in the Standard Model.- Selecting Secure Passwords.- Human Identification Through Image Evaluation Using Secret Predicates.- Hash Functions.- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function.- Second Preimages for SMASH.- Digital Signatures (I).- A Practical Optimal Padding for Signature Schemes.- Directed Transitive Signature Scheme.- Identity-Based Multi-signatures from RSA.- Cryptographic Protocols (I).- Improved Efficiency for Private Stable Matching.- Compact E-Cash from Bounded Accumulator.- Batch Processing of Interactive Proofs.- Side-Channel Attacks (I).- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls.- Predicting Secret Keys Via Branch Prediction.- Side-Channel Attacks (II).- Template Attacks on Masking-Resistance Is Futile.- Differential Power Analysis of Stream Ciphers.- Cache Based Remote Timing Attack on the AES.- Cryptographic Protocols (II).- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement.- Efficient Password-Authenticated Key Exchange Based on RSA.- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels.- Digital Signatures (II).- A Practical and Tightly Secure Signature Scheme Without Hash Function.- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature.- Efficient Implementation.- Public Key Cryptography and RFID Tags.- A Bit-Slice Implementation of the Whirlpool Hash Function.

「Nielsen BookData」 より

関連文献: 1件中  1-1を表示

詳細情報

  • NII書誌ID(NCID)
    BA80296331
  • ISBN
    • 9783540693277
  • LCCN
    2006938905
  • 出版国コード
    gw
  • タイトル言語コード
    eng
  • 本文言語コード
    eng
  • 出版地
    Berlin
  • ページ数/冊数
    xi, 401 p.
  • 大きさ
    24 cm
  • 分類
  • 親書誌ID
ページトップへ