Topics in Cryptology - CT-RSA 2009 : The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009. The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical s...

Celý popis

Uloženo v:
Podrobná bibliografie
Další autoři: Fischlin, Marc (Editor)
Korporace: SpringerLink (online služba)  
Médium: E-kniha
Jazyk:angličtina
Vydáno: Berlin ; Heidelberg : Springer Berlin Heidelberg, 2009
Edice:Lecture Notes in Computer Science
Žánr/forma:elektronické knihy
ISBN:978-3-642-00862-7
9783642008610
Témata:
On-line přístup:Plný text
Tagy: Přidat tag
Žádné tagy, Buďte první, kdo otaguje tento záznam!
Obálka
LEADER 05558nam a22006015i 4500
001 001820928
003 CZ PrSTK
005 20170125035418.0
006 m f d
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 978-3-642-00862-7  |9 9783642008627 
024 7 |a 10.1007/978-3-642-00862-7  |2 doi 
040 |a DE-He213  |b cze  |d ABA013 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004  |2 MRF 
245 1 0 |a Topics in Cryptology - CT-RSA 2009 :  |b The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings /  |c edited by Marc Fischlin 
264 1 |a Berlin ;  |a Heidelberg :  |b Springer Berlin Heidelberg,  |c 2009 
300 |a 1 online zdroj (XI, 482 stran) 
336 |a text  |b txt  |2 rdacontent 
337 |a počítač  |b c  |2 rdamedia 
338 |a online zdroj  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 5473 
505 0 |a Identity-Based Encryption -- Adaptive-ID Secure Revocable Identity-Based Encryption -- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations -- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption -- Protocol Analysis -- Attacks on the DECT Authentication Mechanisms -- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 -- Two-Party Protocols -- Key Insulation and Intrusion Resilience over a Public Channel -- Statistically Hiding Sets -- Adaptively Secure Two-Party Computation with Erasures -- More Than Signatures -- Short Redactable Signatures Using Random Trees -- Divisible On-Line/Off-Line Signatures -- Collisions for Hash Functions -- Speeding up Collision Search for Byte-Oriented Hash Functions --- 
505 0 |9 ^^  |a Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security -- Cryptanalysis -- A Statistical Saturation Attack against the Block Cipher PRESENT -- Practical Attacks on Masked Hardware -- Cryptanalysis of CTC2 -- Alternative Encryption -- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model -- Square, a New Multivariate Encryption Scheme -- Privacy and Anonymity -- Communication-Efficient Private Protocols for Longest Common Subsequence -- Key-Private Proxy Re-encryption -- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems -- Effciency Improvements -- Practical Short Signature Batch Verification -- Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity -- Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients -- Multi-Party Protocols --- 
505 0 |9 ^^  |a Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values -- Local Sequentiality Does Not Help for Concurrent Composition -- Security of Encryption Schemes -- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening -- Strengthening Security of RSA-OAEP -- Faults and Countermeasures -- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable -- Fault Analysis Attack against an AES Prototype Chip Using RSL -- Countermeasures and Faults -- Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags -- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation 
520 |a This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009. The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and faults 
655 7 |a elektronické knihy  |7 fd186907  |2 czenas 
659 0 |a Computer science 
659 0 |a Computer communication systems 
659 0 |a Computer security 
659 0 |a Data encryption (Computer science) 
659 0 |a Coding theory 
659 0 |a Algorithms 
659 0 |a Computer science  |x Mathematics 
659 1 4 |a Computer Science 
659 2 4 |a Data Encryption 
659 2 4 |a Coding and Information Theory 
659 2 4 |a Discrete Mathematics in Computer Science 
659 2 4 |a Systems and Data Security 
659 2 4 |a Computer Communication Networks 
659 2 4 |a Algorithm Analysis and Problem Complexity 
650 0 7 |a informatika  |x if  |7 psh6548  |2 psh 
650 0 7 |a počítačová bezpečnost  |x vt  |7 psh12336  |2 psh 
650 0 7 |a šifrování dat  |x vt  |7 psh12353  |2 psh 
650 0 7 |a algoritmizace  |x vt  |7 psh12472  |2 psh 
700 1 |a Fischlin, Marc  |4 edt 
710 2 |a SpringerLink (online služba)  |7 ntk2018999494 
776 0 8 |i Tištěné vydání:  |t Topics in Cryptology - CT-RSA 2009 : The Cryptographers’ Track at the RSA Conference 2009, San Francisco, CA, USA, April 20-24, 2009. Proceedings  |z 9783642008610 
830 0 |a Lecture Notes in Computer Science 
856 4 0 |u https://doi.org/10.1007/978-3-642-00862-7  |y Plný text 
910 |a ABA013 
950 |a Springer  |b Lecture Notes in Computer Science 2017