Buch, Englisch, Band 2442, 630 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1970 g
22nd Annual International Cryptology Conference Santa Barbara, California, USA, August 18-22, 2002. Proceedings
Buch, Englisch, Band 2442, 630 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 1970 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-44050-5
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Technische Informatik Externe Speicher & Peripheriegeräte
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Betriebssysteme Windows Betriebssysteme
- Mathematik | Informatik EDV | Informatik Informatik Logik, formale Sprachen, Automaten
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
Block Ciphers.- Essential Algebraic Structure within the AES.- Blockwise-Adaptive Attackers Revisiting the (In)Security of Some Provably Secure Encryption Modes: CBC, GEM, IACBC.- Tweakable Block Ciphers.- Multi-user Oriented Cryptosystems.- The LSD Broadcast Encryption Scheme.- Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials.- Foundations and Methodology.- Provably Secure Steganography.- Flaws in Applying Proof Methodologies to Signature Schemes.- Separating Random Oracle Proofs from Complexity Theoretic Proofs: The Non-committing Encryption Case.- Security of Practical Protocols.- On the Security of RSA Encryption in TLS.- Security Analysis of IKE’s Signature-Based Key-Exchange Protocol.- GQ and Schnorr Identification Schemes: Proofs of Security against Impersonation under Active and Concurrent Attacks.- Secure Multiparty Computation.- On 2-Round Secure Multiparty Computation.- Private Computation — k-Connected versus 1-Connected Networks.- Public-Key Encryption.- Analysis and Improvements of NTRU Encryption Paddings.- Universal Padding Schemes for RSA.- Cryptanalysis of Unbalanced RSA with Small CRT-Exponent.- Information Theory and Secret Sharing.- Hyper-encryption against Space-Bounded Adversaries from On-Line Strong Extractors.- Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups.- Cipher Design and Analysis.- A Generalized Birthday Problem.- (Not So) Random Shuffles of RC4.- Black-Box Analysis of the Block-Cipher-Based Hash-Function Constructions from PGV.- Elliptic Curves and Abelian Varieties.- Supersingular Abelian Varieties in Cryptology.- Efficient Algorithms for Pairing-Based Cryptosystems.- Computing Zeta Functions of Hyperelliptic Curves over Finite Fields of Characteristic 2.- Password-BasedAuthentication.- Threshold Password-Authenticated Key Exchange.- Distributed Cryptosystems.- A Threshold Pseudorandom Function Construction and Its Applications.- Efficient Computation Modulo a Shared Secret with Application to the Generation of Shared Safe-Prime Products.- Pseudorandomness and Applications.- Hidden Number Problem with the Trace and Bit Security of XTR and LUC.- Expanding Pseudorandom Functions; or: From Known-Plaintext Security to Chosen-Plaintext Security.- Variations on Signatures and Authentication.- Threshold Ring Signatures and Applications to Ad-hoc Groups.- Deniable Ring Authentication.- SiBIR: Signer-Base Intrusion-Resilient Signatures.- Stream Ciphers and Boolean Functions.- Cryptanalysis of Stream Ciphers with Linear Masking.- The Filter-Combiner Model for Memoryless Synchronous Stream Ciphers.- A Larger Class of Cryptographic Boolean Functions via a Study of the Maiorana-McFarland Construction.- Commitment Schemes.- Linear VSS and Distributed Commitments Based on Secret Sharing and Pairwise Checks.- Perfect Hiding and Perfect Binding Universally Composable Commitment Schemes with Constant Expansion Factor.- Signature Schemes.- Unique Signatures and Verifiable Random Functions from the DH-DDH Separation.- Security Proof for Partial-Domain Hash Signature Schemes.