Phong Q. Nguyen (ed.)First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers
Progress in Cryptology - VIETCRYPT 2006
First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers
Herausgegeben:Nguyen, Phong Q.
Phong Q. Nguyen (ed.)First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers
Progress in Cryptology - VIETCRYPT 2006
First International Conference on Cryptology in Vietnam, Hanoi, Vietnam, September 25-28, 2006, Revised Selected Papers
Herausgegeben:Nguyen, Phong Q.
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, September 2006. The 25 papers cover signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.
Andere Kunden interessierten sich auch für
- Dipanwita Roy Chowdhury (ed.) Rijmen . Vincent / Abhijit Das (Volume editor)Progress in Cryptology - INDOCRYPT 200838,99 €
- K. Srinathan / C. Pandu Rangan / Moti Yung (eds.)Progress in Cryptology - INDOCRYPT 200738,99 €
- Subhamoy Maitra / C.E. Veni Madhavan / Ramarathnam Venkatesan (eds.)Progress in Cryptology - INDOCRYPT 200539,99 €
- Min Surp Rhee / Byoungcheon Lee (eds.)Information Security and Cryptology - ICISC 200639,99 €
- Lynn Batten / Reihaneh Safavi-Naini (eds.)Information Security and Privacy39,99 €
- Yi Mu / Willy Susilo / Jennifer Seberry (eds.)Information Security and Privacy39,99 €
- Bimal Roy / Eiji Okamoto (eds.)Progress in Cryptology - INDOCRYPT 200039,99 €
-
-
-
This book constitutes the thoroughly refereed post-proceedings of the First International Conference on Cryptology in Vietnam, VIETCRYPT 2006, held in Hanoi, Vietnam, September 2006. The 25 papers cover signatures and lightweight cryptography, pairing-based cryptography, algorithmic number theory, ring signatures and group signatures, hash functions, cryptanalysis, key agreement and threshold cryptography, as well as public-key encryption.
Produktdetails
- Produktdetails
- Lecture Notes in Computer Science 4341
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 11958239, 978-3-540-68799-3
- 2006
- Seitenzahl: 400
- Erscheinungstermin: 27. Dezember 2006
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 610g
- ISBN-13: 9783540687993
- ISBN-10: 3540687998
- Artikelnr.: 21580995
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
- Lecture Notes in Computer Science 4341
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 11958239, 978-3-540-68799-3
- 2006
- Seitenzahl: 400
- Erscheinungstermin: 27. Dezember 2006
- Englisch
- Abmessung: 235mm x 155mm x 22mm
- Gewicht: 610g
- ISBN-13: 9783540687993
- ISBN-10: 3540687998
- Artikelnr.: 21580995
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Signatures and Lightweight Cryptography.- Probabilistic Multivariate Cryptography.- Short 2-Move Undeniable Signatures.- Searching for Compact Algorithms: cgen.- Invited Talk.- On Pairing-Based Cryptosystems.- Pairing-Based Cryptography.- A New Signature Scheme Without Random Oracles from Bilinear Pairings.- Efficient Dynamic k-Times Anonymous Authentication.- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?.- Algorithmic Number Theory.- Factorization of Square-Free Integers with High Bits Known.- Scalar Multiplication on Koblitz Curves Using Double Bases.- Compressed Jacobian Coordinates for OEF.- Ring Signatures and Group Signatures.- On the Definition of Anonymity for Ring Signatures.- Escrowed Linkability of Ring Signatures and Its Applications.- Dynamic Fully Anonymous Short Group Signatures.- Hash Functions.- Formalizing Human Ignorance.- Discrete Logarithm Variants of VSH.- How to Construct Sufficient Conditions for Hash Functions.- Cryptanalysis.- Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.- On the Internal Structure of Alpha-MAC.- A Weak Key Class of XTEA for a Related-Key Rectangle Attack.- Key Agreement and Threshold Cryptography.- Deniable Group Key Agreement.- An Ideal and Robust Threshold RSA.- Towards Provably Secure Group Key Agreement Building on Group Theory.- Public-Key Encryption.- Universally Composable Identity-Based Encryption.- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.- Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.
Signatures and Lightweight Cryptography.- Probabilistic Multivariate Cryptography.- Short 2-Move Undeniable Signatures.- Searching for Compact Algorithms: cgen.- Invited Talk.- On Pairing-Based Cryptosystems.- Pairing-Based Cryptography.- A New Signature Scheme Without Random Oracles from Bilinear Pairings.- Efficient Dynamic k-Times Anonymous Authentication.- Side Channel Analysis of Practical Pairing Implementations: Which Path Is More Secure?.- Algorithmic Number Theory.- Factorization of Square-Free Integers with High Bits Known.- Scalar Multiplication on Koblitz Curves Using Double Bases.- Compressed Jacobian Coordinates for OEF.- Ring Signatures and Group Signatures.- On the Definition of Anonymity for Ring Signatures.- Escrowed Linkability of Ring Signatures and Its Applications.- Dynamic Fully Anonymous Short Group Signatures.- Hash Functions.- Formalizing Human Ignorance.- Discrete Logarithm Variants of VSH.- How to Construct Sufficient Conditions for Hash Functions.- Cryptanalysis.- Improved Fast Correlation Attack on the Shrinking and Self-shrinking Generators.- On the Internal Structure of Alpha-MAC.- A Weak Key Class of XTEA for a Related-Key Rectangle Attack.- Key Agreement and Threshold Cryptography.- Deniable Group Key Agreement.- An Ideal and Robust Threshold RSA.- Towards Provably Secure Group Key Agreement Building on Group Theory.- Public-Key Encryption.- Universally Composable Identity-Based Encryption.- Traitor Tracing for Stateful Pirate Decoders with Constant Ciphertext Rate.- Reducing the Spread of Damage of Key Exposures in Key-Insulated Encryption.