Description |
xi, 353 pages : illustrations ; 24 cm |
Series |
Lecture notes in computer science, 0302-9743 ; 3357 |
|
Lecture notes in computer science ; 3357
|
Contents |
An improved correlation attack on A5/1 / Alexander Maximov, Thomas Johansson and Steve Babbage -- Extending the resynchronization attack / Frederik Armknecht, Joseph Lano and Bart Preneel -- A new simple technique to attack filter generators and related ciphers / Hakan Englund and Thomas Johansson -- On XTR and side-channel analysis / Daniel Page and Martijn Stam -- Provably secure masking of AES / Johannes Blomer, Jorge Guajardo and Volker Krummel -- Perfect diffusion primitives for block ciphers -- building efficient MDS matrices / Pascal Junod and Serge Vaudenay -- Security of the MISTY structure in the Luby-Rackoff model : improved results / Gilles Piret and Jean-Jacques Quisquater -- FOX : a new family of block ciphers / Pascal Junod and Serge Vaudenay -- A note on the signed sliding window integer recoding and a left-to-right analogue / Roberto Maria Avanzi -- Fast irreducibility testing for XTR using a gaussian normal basis of low complexity / Soonhak Kwon, Chang Hoon Kim and Chun Pyo Hong -- Modular number systems : beyond the Mersenne family / Jean-Claude Bajard, Laurent Imbert and Thomas Plantard -- Efficient doubling on genus two curves over binary fields / Tanja Lange and Marc Stevens -- About the security of ciphers (semantic security and pseudo-random permutations) / Duong Hieu Phan and David Pointcheval -- A subliminal channel in secret block ciphers / Adam Young and Moti Yung -- Blockwise adversarial model for on-line ciphers and symmetric encryption schemes / Pierre-Alain Fouque, Antoine Joux and Guillaume Poupard -- Cryptanalysis of a white box AES implementation / Olivier Billet, Henri Gilbert and Charaf Ech-Chatbi -- Predicting subset sum pseudorandom generators / Joachim von zur Gathen and Igor E. Shparlinski -- Collision attack and pseudorandomness of reduced-round Camellia / Wu Wenling, Feng Dengguo and Chen Hua -- Password based key exchange with mutual authentication / Shaoquan Jiang and Guang Gong -- Product construction of key distribution schemes for sensor networks / Reizhong Wei and Jiang Wu -- Deterministic key predistribution schemes for distributed sensor networks / Jooyoung Lee and Douglas R. Stinson -- On proactive secret sharing schemes / Ventzislav Nikov and Svetla Nikova -- Efficient constructions of variable-input-length block ciphers / Sarvar Patel, Zulfikar Ramzan and Ganapathy S. Sundaram -- A sufficient condition for optimal domain extension of UOWHFs / Mridul Nandi |
Analysis |
Cryptography |
|
SAC |
Bibliography |
Includes bibliographical references and index |
Notes |
Also issued online |
|
Mode of access: World Wide Web |
|
Print version record |
Subject |
Cryptography -- Congresses.
|
|
Data encryption (Computer science) -- Congresses.
|
|
Computer security -- Congresses.
|
Genre/Form |
Ebook
|
|
Conference papers and proceedings.
|
|
Conference papers and proceedings.
|
|
Kongress
|
Author |
Handschuh, Helena.
|
|
Hasan, M. Anwar.
|
LC no. |
2004117402 |
ISBN |
3540243275 paperback |
|