Topics in Cryptology – CT-RSA 2005 The Cryptographers’ Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Menezes, Alfred (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2005.
Σειρά:Lecture Notes in Computer Science, 3376
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talks
  • Sub-linear Queries Statistical Databases: Privacy with Power
  • Malicious Cryptography: Kleptographic Aspects
  • Cryptanalysis
  • Resistance of SNOW 2.0 Against Algebraic Attacks
  • A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes
  • Hold Your Sessions: An Attack on Java Session-Id Generation
  • Update on SHA-1
  • A Fast Correlation Attack on the Shrinking Generator
  • Public-Key Encryption
  • Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption
  • A Generic Conversion with Optimal Redundancy
  • Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3
  • Signature Schemes
  • Foundations of Group Signatures: The Case of Dynamic Groups
  • Time-Selective Convertible Undeniable Signatures
  • Design Principles
  • On Tolerant Cryptographic Constructions
  • Password-Based Protocols
  • Simple Password-Based Encrypted Key Exchange Protocols
  • Hard Bits of the Discrete Log with Applications to Password Authentication
  • Proofs for Two-Server Password Authentication
  • Design and Analysis of Password-Based Key Derivation Functions
  • Pairings
  • A New Two-Party Identity-Based Authenticated Key Agreement
  • Accumulators from Bilinear Pairings and Applications
  • Computing the Tate Pairing
  • Fast and Proven Secure Blind Identity-Based Signcryption from Pairings
  • Efficient and Secure Implementation
  • A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box
  • CryptoGraphics: Secret Key Cryptography Using Graphics Cards
  • Side-Channel Leakage of Masked CMOS Gates
  • New Minimal Weight Representations for Left-to-Right Window Methods.