Warehouse Stock Clearance Sale

Grab a bargain today!


Selected Areas in Cryptography
By

Rating

Product Description
Product Details

Table of Contents

Elliptic and Hyperelliptic Curve Arithmetic.- Faster Halvings in Genus 2.- Efficient Pairing Computation on Genus 2 Curves in Projective Coordinates.- On Software Parallel Implementation of Cryptographic Pairings.- Block Ciphers I.- The Cryptanalysis of Reduced-Round SMS4.- Building Secure Block Ciphers on Generic Attacks Assumptions.- First Invited Talk.- Lifting and Elliptic Curve Discrete Logarithms.- Hash Functions I.- Preimage Attacks on One-Block MD4, 63-Step MD5 and More.- Preimage Attacks on 3-Pass HAVAL and Step-Reduced MD5.- Cryptanalysis of Tweaked Versions of SMASH and Reparation.- Mathematical Aspects of Applied Cryptography I.- Counting Functions for the k-Error Linear Complexity of 2 n -Periodic Binary Sequences.- On the Exact Success Rate of Side Channel Analysis in the Gaussian Model.- Stream Ciphers Cryptanalysis.- Algebraic and Correlation Attacks against Linearly Filtered Non Linear Feedback Shift Registers.- A Cache Timing Analysis of HC-256.- An Improved Fast Correlation Attack on Stream Ciphers.- Hash Functions II.- A Three-Property-Secure Hash Function.- Analysis of the Collision Resistance of RadioGatúnUsing Algebraic Techniques.- A Scheme to Base a Hash Function on a Block Cipher.- Collisions and Other Non-random Properties for Step-Reduced SHA-256.- Cryptography with Algebraic Curves.- Public Verifiability from Pairings in Secret Sharing Schemes.- The Elliptic Curve Discrete Logarithm Problem and Equivalent Hard Problems for Elliptic Divisibility Sequences.- Second Invited Talk – Stafford Tavares Lecture.- The “Coefficients H” Technique.- Mathematical Aspects of Applied Cryptography II.- Distinguishing Multiplications from Squaring Operations.- Subquadratic Polynomial Multiplication over GF(2 m ) Using Trinomial Bases and ChineseRemaindering.- Bounds on Fixed Input/Output Length Post-processing Functions for Biased Physical Random Number Generators.- Curve-Based Primitives in Hardware.- HECC Goes Embedded: An Area-Efficient Implementation of HECC.- ECC Is Ready for RFID – A Proof in Silicon.- Block Ciphers II.- Cryptanalysis of a Generic Class of White-Box Implementations.- New Linear Cryptanalytic Results of Reduced-Round of CAST-128 and CAST-256.- Improved Impossible Differential Cryptanalysis of Reduced-Round Camellia.

Ask a Question About this Product More...
 
This title is unavailable for purchase as none of our regular suppliers have stock available. If you are the publisher, author or distributor for this item, please visit this link.

Back to top