Progress in Cryptology - INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010. Proceedings /
Συγγραφή απο Οργανισμό/Αρχή: | |
---|---|
Άλλοι συγγραφείς: | , |
Μορφή: | Ηλεκτρονική πηγή Ηλ. βιβλίο |
Γλώσσα: | English |
Έκδοση: |
Berlin, Heidelberg :
Springer Berlin Heidelberg,
2010.
|
Σειρά: | Lecture Notes in Computer Science,
6498 |
Θέματα: | |
Διαθέσιμο Online: | Full Text via HEAL-Link |
Πίνακας περιεχομένων:
- Invited Talk
- Getting a Few Things Right and Many Things Wrong
- Security of RSA and Multivariate Schemes
- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions
- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key
- Security Analysis, Pseudorandom Permutations and Applications
- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations
- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
- Invited Talk
- Cryptographic Hash Functions: Theory and Practice
- Hash Functions
- Cryptanalysis of Tav-128 Hash Function
- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing
- Speeding Up the Wide-Pipe: Secure and Fast Hashing
- Attacks on Block Ciphers and Stream Ciphers
- New Boomerang Attacks on ARIA
- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- Greedy Distinguishers and Nonrandomness Detectors
- Fast Cryptographic Computation
- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity
- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication
- Cryptanalysis of AES
- Attack on a Higher-Order Masking of the AES Based on Homographic Functions
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Cryptanalysis of a Perturbated White-Box AES Implementation
- Efficient Implementation
- A Program Generator for Intel AES-NI Instructions
- ECC2K-130 on NVIDIA GPUs
- One Byte per Clock: A Novel RC4 Hardware.