Progress in Cryptology - INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings /
Clasificación: | Libro Electrónico |
---|---|
Autor Corporativo: | |
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edición: | 1st ed. 2010. |
Colección: | Security and Cryptology ;
6498 |
Temas: | |
Acceso en línea: | Texto Completo |
Tabla de Contenidos:
- Invited Talk
- Getting a Few Things Right and Many Things Wrong
- Security of RSA and Multivariate Schemes
- Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions
- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks
- CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key
- Security Analysis, Pseudorandom Permutations and Applications
- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols
- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations
- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants
- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface
- Invited Talk
- Cryptographic Hash Functions: Theory and Practice
- Hash Functions
- Cryptanalysis of Tav-128 Hash Function
- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing
- Speeding Up the Wide-Pipe: Secure and Fast Hashing
- Attacks on Block Ciphers and Stream Ciphers
- New Boomerang Attacks on ARIA
- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers
- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA
- Greedy Distinguishers and Nonrandomness Detectors
- Fast Cryptographic Computation
- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity
- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication
- Cryptanalysis of AES
- Attack on a Higher-Order Masking of the AES Based on Homographic Functions
- Improved Impossible Differential Cryptanalysis of 7-Round AES-128
- Cryptanalysis of a Perturbated White-Box AES Implementation
- Efficient Implementation
- A Program Generator for Intel AES-NI Instructions
- ECC2K-130 on NVIDIA GPUs
- One Byte per Clock: A Novel RC4 Hardware.