|  |
 |
| Artikel-Nr.: 5667A-9783540734574 Herst.-Nr.: 9783540734574 EAN/GTIN: 9783540734574 |
| |
|
|  |  |
 | Stream Ciphers.- An Analysis of the Hermes8 Stream Ciphers.- On the Security of the LILI Family of Stream Ciphers Against Algebraic Attacks.- Strengthening NLS Against Crossword Puzzle Attack.- Hashing.- A New Strategy for Finding a Differential Path of SHA-1.- Preimage Attack on the Parallel FFT-Hashing Function.- Second Preimages for Iterated Hash Functions and Their Implications on MACs.- On Building Hash Functions from Multivariate Quadratic Equations.- Biometrics.- An Application of the Goldwasser-Micali Cryptosystem to Biometric Authentication.- Soft Generation of Secure Biometric Keys.- Secret Sharing.- Flaws in Some Secret Sharing Schemes Against Cheating.- Efficient (k,n) Threshold Secret Sharing Schemes Secure Against Cheating from n???1 Cheaters.- Cryptanalysis.- Related-Key Amplified Boomerang Attacks on the Full-Round Eagle-64 and Eagle-128.- Analysis of the SMS4 Block Cipher.- Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.- Public Key Cryptography.- : A Hardware-Oriented Trapdoor Cipher.- Anonymity on Paillier's Trap-Door Permutation.- Generic Certificateless Key Encapsulation Mechanism.- Double-Size Bipartite Modular Multiplication.- Affine Precomputation with Sole Inversion in Elliptic Curve Cryptography.- Construction of Threshold (Hybrid) Encryption in the Random Oracle Model: How to Construct Secure Threshold Tag-KEM from Weakly Secure Threshold KEM.- Efficient Chosen-Ciphertext Secure Identity-Based Encryption with Wildcards.- Authentication.- Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication.- Certificateless Signature Revisited.- Identity-Committable Signatures and Their Extension to Group-Oriented Ring Signatures.- Hash-and-Sign with Weak Hashing Made Secure.- "Sandwich"Is Indeed Secure: How to Authenticate a Message with Just One Hashing.- Threshold Anonymous Group Identification and Zero-Knowledge Proof.- Non-interactive Manual Channel Message Authentication Based on eTCR Hash Functions.- E-Commerce.- A Practical System for Globally Revoking the Unlinkable Pseudonyms of Unknown Users.- Efficient and Secure Comparison for On-Line Auctions.- Practical Compact E-Cash.- Security.- Use of Dempster-Shafer Theory and Bayesian Inferencing for Fraud Detection in Mobile Communication Networks.- On Proactive Perfectly Secure Message Transmission. Weitere Informationen:  |  | Author: | Josef Pieprzyk; Hossein Ghodosi; Ed Dawson | Verlag: | Springer Berlin | Sprache: | eng |
|
|  |  |
 | |  |  |
 | Weitere Suchbegriffe: Datenbankenbücher, allgemeine Informatikbücher - englischsprachig, bücher über e-commerce - englischsprachig, Datensicherheit, Datensicherung, Sicherheit / Datensicherheit, Kryptografie, Verschlüsselung, Information, Signatur, anonymity, authentication, bilinear pairings, biometrics |
|  |  |
| |