رکورد قبلیرکورد بعدی

" Topics in Cryptology - CT-RSA 2013 : "


Document Type : BL
Record Number : 747808
Doc. No : b567759
Main Entry : edited by Ed Dawson.
Title & Author : Topics in Cryptology - CT-RSA 2013 : : the Cryptographers' Track at the RSA Conference 2013, San Francisco, CA, USA, February 25-March 1, 2013. Proceedings\ edited by Ed Dawson.
Publication Statement : Berlin, Heidelberg Springer Berlin Heidelberg Imprint : Springer, 2013
Series Statement : Lecture notes in computer science, 7779.
Page. NO : (XIV, 405 pages 68 illustrations)
ISBN : 3642360947
: : 3642360955
: : 9783642360947
: : 9783642360954
Contents : Side Channel Attacks I --; Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL --; Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party --; Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures --; Public-Key Encryption I --; Robust and Plaintext-Aware Variant of Signed ElGamal Encryption --; Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks --; Cryptographic Protocols I --; Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes --; Randomized Partial Checking Revisited --; Secure Implementation Methods --; Randomly Failed! The State of Randomness in Current Java Implementations --; Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl --; Symmetric Key Primitives I --; Collisions for the WIDEA-8 Compression Function --; Finding Collisions for Round-Reduced SM3 --; Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures --; Side Channel Attacks II --; Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag --; Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness --; Cryptographic Protocols II --; Cryptanalytic Attacks on MIFARE Classic Protocol --; Asynchronous Computational VSS with Reduced Communication Complexity --; Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 --; Solving BDD by Enumeration: An Update --; Identity-Based Encryption --; The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions --; Accountable Authority Identity-Based Encryption with Public Traceability --; Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption --; Symmetric Key Primitives II --; The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users --; A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy --; Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Abstract : This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
Subject : Computer networks.
Subject : Computer science.
Subject : Operating systems (Computers)
LC Classification : ‭QA76.9.A25‬‭E358 2013‬
Added Entry : Ed Dawson
کپی لینک

پیشنهاد خرید
پیوستها
Search result is zero
نظرسنجی
نظرسنجی منابع دیجیتال

1 - آیا از کیفیت منابع دیجیتال راضی هستید؟