Topics in Cryptology -CT-RSA 2006
The Cryptographers' Track at the RSA Conference 2006, San Jose, Ca, USA, February 13-17, 2005, Proceedings: 2006 (Lecture Notes in Computer Science / Security and Cryptology)
Elsewhere $161.95 $85.62 Save $76.33 (47%)
Free shipping Australia wide
Order Now for Christmas with e-Gift
|Format: ||Paperback / softback, 384 pages|
|Other Information: ||Illustrations|
|Published In: ||Germany, 19 January 2006|
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006. The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.
Table of Contents
Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES-192.- Identification.- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.- Fair Identification.- Algebra.- Efficient Doubling on Genus 3 Curves over Binary Fields.- Another Look at Small RSA Exponents.- Integrity.- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing.- RFID-Tags for Anti-counterfeiting.- Public Key Encryption.- A "Medium-Field" Multivariate Public-Key Encryption Scheme.- A New Security Proof for Damgard's ElGamal.- Signatures.- Stand-Alone and Setup-Free Verifiably Committed Signatures.- Toward the Fair Anonymous Signatures: Deniable Ring Signatures.- Side-Channel Attacks.- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.- Higher Order Masking of the AES.- CCA Encryption.- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.- Message Authentication.- On the (Im)possibility of Blind Message Authentication Codes.- An Optimal Non-interactive Message Authentication Protocol.- Block Ciphers.- A New Criterion for Nonlinearity of Block Ciphers.- Block Ciphers Sensitive to Grobner Basis Attacks.- Multi-party Computation.- Universally Composable Oblivious Transfer in the Multi-party Setting.- A Round and Communication Efficient Secure Ranking Protocol.
Springer-Verlag Berlin and Heidelberg GmbH & Co. K|
15.6 x 23.39 x 2.01 centimetres (0.54 kg)|
15+ years |