Topics in Cryptology CT-RSA 2004 00 : the Cryptographers Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings / edited by Tatsuaki Okamoto.Material type: TextSeries: Serienbezeichnung | Lecture notes in computer science ; 2964,Publication details: Berlin ; Heidelberg : Springer-Verlag Berlin Heidelberg, 2004. Description: 1 online resourceContent type: text Media type: computer Carrier type: online resourceISBN: 9783540246602; 3540246606Subject(s): Computer science | Computer Communication Networks | Operating systems (Computers) | Data encryption (Computer science) | Computer software | Computational complexity | Information Systems | Data Encryption | Operating Systems | Algorithm Analysis and Problem Complexity | Discrete Mathematics in Computer Science | Management of Computing and Information Systems | Computational complexity | Computer science | Computer software | Data encryption (Computer science) | Operating systems (Computers)Genre/Form: Electronic books. Additional physical formats: Print version:: Topics in Cryptology - CT-RSA 2004 : The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings.DDC classification: 005.8 LOC classification: QA76.9.A25Online resources: Click here to access online
|Item type||Current library||Collection||Call number||Status||Date due||Barcode||Item holds|
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2004, CT-RSA 2004, held in San Francisco, CA, USA in February 2004. The 28 revised full papers presented were carefully reviewed and selected from 77 submissions. The papers are organized in topical sections on symmetric encryption, asymmetric encryption, digital signatures, protocols, side-channel attacks, hardware, modes of operation, hash and hash chains, visual cryptography, and elliptic curve cryptosystems.
Symmetric Encryption -- Online Encryption Schemes: New Security Notions and Constructions -- Related-Key Attacks on Triple-DES and DESX Variants -- Design of AES Based on Dual Cipher and Composite Field -- Periodic Properties of Counter Assisted Stream Ciphers -- A Fast Correlation Attack via Unequal Error Correcting LDPC Codes -- Aymmetric Encryption -- k-Resilient Identity-Based Encryption in the Standard Model -- A Generic Construction for Intrusion-Resilient Public-Key Encryption -- Digital Signatures -- A Certificate-Based Signature Scheme -- Identity Based Undeniable Signatures -- Compressing Rabin Signatures -- Protocols -- A Key Recovery System as Secure as Factoring -- Server Assisted Signatures Revisited -- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 -- Universal Re-encryption for Mixnets -- Bit String Commitment Reductions with a Non-zero Rate -- Improving Robustness of PGP Keyrings by Conflict Detection -- Side-Channel Attacks -- Issues of Security with the Oswald-Aigner Exponentiation Algorithm -- Hardware Countermeasures against DPA -- A Statistical Analysis of Their Effectiveness -- Self-Randomized Exponentiation Algorithms -- Hardwares -- Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems -- High-Speed Modular Multiplication -- Yet Another Sieving Device -- Mode of Operations -- A Parallelizable Enciphering Mode -- Padding Oracle Attacks on the ISO CBC Mode Encryption Standard -- Hash and Hash Chains -- A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512 -- Fast Verification of Hash Chains -- Visual Cryptography -- Almost Ideal Contrast Visual Cryptography with Reversing -- Ellictic Curve Cryptosystems -- Weak Fields for ECC.