Progress in Cryptology - INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings /

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Gong, Guang (Επιμελητής έκδοσης), Gupta, Kishan Chand (Επιμελητής έκδοσης)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg, 2010.
Σειρά:Lecture Notes in Computer Science, 6498
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
Πίνακας περιεχομένων:
  • Invited Talk
  • Getting a Few Things Right and Many Things Wrong
  • Security of RSA and Multivariate Schemes
  • Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions
  • Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
  • CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key
  • Security Analysis, Pseudorandom Permutations and Applications
  • Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
  • Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations
  • The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
  • Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
  • Invited Talk
  • Cryptographic Hash Functions: Theory and Practice
  • Hash Functions
  • Cryptanalysis of Tav-128 Hash Function
  • Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing
  • Speeding Up the Wide-Pipe: Secure and Fast Hashing
  • Attacks on Block Ciphers and Stream Ciphers
  • New Boomerang Attacks on ARIA
  • Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
  • The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
  • Greedy Distinguishers and Nonrandomness Detectors
  • Fast Cryptographic Computation
  • Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity
  • Random Euclidean Addition Chain Generation and Its Application to Point Multiplication
  • Cryptanalysis of AES
  • Attack on a Higher-Order Masking of the AES Based on Homographic Functions
  • Improved Impossible Differential Cryptanalysis of 7-Round AES-128
  • Cryptanalysis of a Perturbated White-Box AES Implementation
  • Efficient Implementation
  • A Program Generator for Intel AES-NI Instructions
  • ECC2K-130 on NVIDIA GPUs
  • One Byte per Clock: A Novel RC4 Hardware.