Now Australia's Biggest Toy Shop

Turn your Clutter Into Cash with SmartSell.TM Book a Courier Pickup Today!

Topics in Cryptology -CT-RSA 2006

New or Used: 15 copies from $80.68
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2006, CT-RSA 2006, held in San Jose, CA, USA in February 2006. The 22 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on attacks on AES, identification, algebra, integrity, public key encryption, signatures, side-channel attacks, CCA encryption, message authentication, block ciphers, and multi-party computation.
Product Details

Table of Contents

Attacks on AES.- Cache Attacks and Countermeasures: The Case of AES.- Related-Key Impossible Differential Attacks on 8-Round AES-192.- Identification.- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators.- Fair Identification.- Algebra.- Efficient Doubling on Genus 3 Curves over Binary Fields.- Another Look at Small RSA Exponents.- Integrity.- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing.- RFID-Tags for Anti-counterfeiting.- Public Key Encryption.- A "Medium-Field" Multivariate Public-Key Encryption Scheme.- A New Security Proof for Damgard's ElGamal.- Signatures.- Stand-Alone and Setup-Free Verifiably Committed Signatures.- Toward the Fair Anonymous Signatures: Deniable Ring Signatures.- Side-Channel Attacks.- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers.- Higher Order Masking of the AES.- CCA Encryption.- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles.- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack.- Message Authentication.- On the (Im)possibility of Blind Message Authentication Codes.- An Optimal Non-interactive Message Authentication Protocol.- Block Ciphers.- A New Criterion for Nonlinearity of Block Ciphers.- Block Ciphers Sensitive to Groebner Basis Attacks.- Multi-party Computation.- Universally Composable Oblivious Transfer in the Multi-party Setting.- A Round and Communication Efficient Secure Ranking Protocol.

Look for similar items by category
People also searched for
How Fishpond Works
Fishpond works with suppliers all over the world to bring you a huge selection of products, really great prices, and delivery included on over 25 million products that we sell. We do our best every day to make Fishpond an awesome place for customers to shop and get what they want — all at the best prices online.
Webmasters, Bloggers & Website Owners
You can earn a 5% commission by selling Topics in Cryptology -CT-RSA 2006: The Cryptographers' Track at the RSA Conference 2006, San Jose, Ca, USA, February 13-17, 2005, Proceedings: 2006 (Lecture Notes in Computer Science / Security and Cryptology) on your website. It's easy to get started - we will give you example code. After you're set-up, your website can earn you money while you work, play or even sleep! You should start right now!
Authors / Publishers
Are you the Author or Publisher of a book? Or the manufacturer of one of the millions of products that we sell. You can improve sales and grow your revenue by submitting additional information on this title. The better the information we have about a product, the more we will sell!
Back to top