注册 | 登录读书好,好读书,读好书!
读书网-DuShu.com
当前位置: 首页出版图书科学技术计算机/网络信息安全密码法进展 INDOCRYPT2006

密码法进展 INDOCRYPT2006

密码法进展 INDOCRYPT2006

定 价:¥678.00

作 者: Rana Barua 著
出版社: 湖南文艺出版社
丛编项:
标 签: 暂缺

购买这本书可以去


ISBN: 9783540497677 出版时间: 2006-12-01 包装: 平装
开本: 页数: 字数:  

内容简介

  This book constitutes the refereed proceedings of the 7th International Conference on Cryptology in India, INDOCRYPT 2006, held in Kolkata, India in December 2006.The 29 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 186 submissions. The papers are organized in topical sections on symmetric cryptography: attacks, hash functions, provable security: key agreement, provable security: public key cryptograpy, symmetric cryptography: design, modes of operation and message authentication codes, fast implementation of public key cryptography, id-based cryptography, as well as embedded systems and side channel attacks.

作者简介

暂缺《密码法进展 INDOCRYPT2006》作者简介

图书目录

Invited Talk
Whither Cryptography?
Symmetric Cryptography: Attacks
 Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
 Differential and Rectangle Attacks on Reduced-Round SHACAL-1
 Algebraic Attacks on Clock-Controlled Cascade Ciphers
 An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
Hash Functions
 Update on Tiger
 RC4-Hash: A New Hash Function Based on RC4
 Security of VSH in the Real World
Provable Security:Key Agreement
 Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
 Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
 On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Invited Talk
 Another Look at "Provable Security". II
Provable Security: Public Key Cryptography
 Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions
 General Conversion for Obtaining Strongly Existentially Unforgeable Signatures
 Conditionally Verifiable Signature
 Constant Phase Bit Optimal Protocols fox Perfectly Reliable and Secure Message Transmission
Symmetric Cryptography: Design
 Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks
……
Modes of Operation and Message Authentication Codes
Fast Implementation of Public Key Cryptogyaphy
ID-Based Cryptography
Embedded System and Side Channel Attacks
Author Index

本目录推荐