Springer Book Archives
Stream Ciphers and Boolean Functions.- The Correlation of a Boolean Function with Its Variables.- On Choice of Connection-Polynomials for LFSR-Based Stream Ciphers.- On Resilient Boolean Functions with Maximal Possible Nonlinearity.- Cryptanalysis I : Stream Ciphers.- Decimation Attack of Stream Ciphers.- Cryptanalysis of the A5/1 GSM Stream Cipher.- Cryptanalysis II : Block Ciphers.- On Bias Estimation in Linear Cryptanalysis.- On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks.- Improved Impossible Differentials on Twofish.- Electronic Cash & Multiparty Computation.- An Online, Transferable E-Cash Payment System.- Anonymity Control in Multi-bank E-Cash System.- Efficient Asynchronous Secure Multiparty Distributed Computation.- Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation.- Digital Signatures.- Codes Identifying Bad Signatures in Batches.- Distributed Signcryption.- Fail-Stop Signature for Long Messages (Extended Abstract).- Elliptic Curves.- Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure against the Timing Attack.- Efficient Construction of Cryptographically Strong Elliptic Curves.- Fast Arithmetic.- High-Speed Software Multiplication in F2m.- On Efficient Normal Basis Multiplication.- Cryptographic Protocols.- Symmetrically Private Information Retrieval.- Two-Pass Authenticated Key Agreement Protocol with Key Confirmation.- Anonymous Traceability Schemes with Unconditional Security.- Block Ciphers & Public Key Cryptography.- New Block Cipher DONUT Using Pairwise Perfect Decorrelation.- Generating RSA Keys on a Handheld Using an Untrusted Server.- A Generalized Takagi-Cryptosystem with a Modulus of the Form prqs.
Ask a Question About this Product More... |