Progress in Cryptology -- AFRICACRYPT 2009
Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings
Herausgegeben:Preneel, Bart
Progress in Cryptology -- AFRICACRYPT 2009
Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009, Proceedings
Herausgegeben:Preneel, Bart
- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
This book constitutes the proceedings of the Second International Conference on Cryptology in Africa, AFRICACRYPT 2009, held in Gammarth, Tunisia, on June 21-25, 2009. The 25 papers presented together with one invited talk were carefully reviewed and selected from 70 submissions. The topics covered are hash functions, block ciphers, asymmetric encryption, digital signatures, asymmetric encryption and anonymity, key agreement protocols, cryptographic protocols, efficient implementations, and implementation attacks.
- Serge Vaudenay (ed.)Progress in Cryptology - AFRICACRYPT 200842,99 €
- Dipanwita Roy Chowdhury (ed.) Rijmen . Vincent / Abhijit Das (Volume editor)Progress in Cryptology - INDOCRYPT 200842,99 €
- Post-Quantum Cryptography50,99 €
- Kaoru Kurosawa (Volume ed.)Advances in Cryptology ¿ ASIACRYPT 200783,99 €
- Advances in Cryptology ¿ EUROCRYPT 201575,99 €
- Advances in Cryptology ¿ EUROCRYPT 201538,99 €
- Progress in Cryptology - AFRICACRYPT 201041,99 €
-
-
-
- Produktdetails
- Lecture Notes in Computer Science 5580
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12693764, 978-3-642-02383-5
- 2009
- Seitenzahl: 448
- Erscheinungstermin: 8. Juni 2009
- Englisch
- Abmessung: 235mm x 155mm x 25mm
- Gewicht: 674g
- ISBN-13: 9783642023835
- ISBN-10: 3642023835
- Artikelnr.: 26335594
- Lecture Notes in Computer Science 5580
- Verlag: Springer / Springer Berlin Heidelberg / Springer, Berlin
- Artikelnr. des Verlages: 12693764, 978-3-642-02383-5
- 2009
- Seitenzahl: 448
- Erscheinungstermin: 8. Juni 2009
- Englisch
- Abmessung: 235mm x 155mm x 25mm
- Gewicht: 674g
- ISBN-13: 9783642023835
- ISBN-10: 3642023835
- Artikelnr.: 26335594
Second Preimage Attack on 5
Pass HAVAL and Partial Key
Recovery Attack on HMAC/NMAC
5
Pass HAVAL.
Cryptanalysis of Vortex.
Two Passes of Tiger Are Not One
Way.
Block Ciphers.
Generic Attacks on Feistel Networks with Internal Permutations.
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks.
Asymmetric Encryption.
Reducing Key Length of the McEliece Cryptosystem.
Cryptanalysis of RSA Using the Ratio of the Primes.
Digital Signatures.
New RSA
Based (Selectively) Convertible Undeniable Signature Schemes.
A Schnorr
Like Lightweight Identity
Based Signature Scheme.
On the Theoretical Gap between Group Signatures with and without Unlinkability.
Practical Threshold Signatures with Linear Secret Sharing Schemes.
Asymmetric Encryption and Anonymity.
Certified Encryption Revisited.
Threshold Attribute
Based Signatures and Their Application to Anonymous Credential Systems.
Anonymity from Public Key Encryption to Undeniable Signatures.
Key Agreement Protocols.
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.
Password
Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Cryptographic Protocols.
Unifying Zero
Knowledge Proofs of Knowledge.
Co
sound Zero
Knowledge with Public Keys.
Another Look at Extended Private Information Retrieval Protocols.
Constructing Universally Composable Oblivious Transfers from Double Trap
Door Encryptions.
Efficient Implementations.
Exponent Recoding and Regular Exponentiation Algorithms.
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware.
Fast Elliptic
Curve Cryptography on the Cell Broadband Engine.
On Modular Decomposition of Integers.
Implementation Attacks.
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed.
An Improved Fault Based Attack of the Advanced Encryption Standard.
Second Preimage Attack on 5
Pass HAVAL and Partial Key
Recovery Attack on HMAC/NMAC
5
Pass HAVAL.
Cryptanalysis of Vortex.
Two Passes of Tiger Are Not One
Way.
Block Ciphers.
Generic Attacks on Feistel Networks with Internal Permutations.
Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks.
Asymmetric Encryption.
Reducing Key Length of the McEliece Cryptosystem.
Cryptanalysis of RSA Using the Ratio of the Primes.
Digital Signatures.
New RSA
Based (Selectively) Convertible Undeniable Signature Schemes.
A Schnorr
Like Lightweight Identity
Based Signature Scheme.
On the Theoretical Gap between Group Signatures with and without Unlinkability.
Practical Threshold Signatures with Linear Secret Sharing Schemes.
Asymmetric Encryption and Anonymity.
Certified Encryption Revisited.
Threshold Attribute
Based Signatures and Their Application to Anonymous Credential Systems.
Anonymity from Public Key Encryption to Undeniable Signatures.
Key Agreement Protocols.
Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps.
Password
Authenticated Group Key Agreement with Adaptive Security and Contributiveness.
Cryptographic Protocols.
Unifying Zero
Knowledge Proofs of Knowledge.
Co
sound Zero
Knowledge with Public Keys.
Another Look at Extended Private Information Retrieval Protocols.
Constructing Universally Composable Oblivious Transfers from Double Trap
Door Encryptions.
Efficient Implementations.
Exponent Recoding and Regular Exponentiation Algorithms.
Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware.
Fast Elliptic
Curve Cryptography on the Cell Broadband Engine.
On Modular Decomposition of Integers.
Implementation Attacks.
Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed.
An Improved Fault Based Attack of the Advanced Encryption Standard.