Burton S. Kaliski Jr. (auth.), Bart Preneel (eds.)3540432248, 9783540432241
Table of contents :
On Hash Function Firewalls in Signature Schemes….Pages 1-16
Observability Analysis – Detecting When Improved Cryptosystems Fail -….Pages 17-29
Precise Bounds for Montgomery Modular Multiplication and Some Potentially Insecure RSA Moduli….Pages 30-39
Montgomery in Practice: How to Do It More Efficiently in Hardware….Pages 40-52
MIST : An Efficient, Randomized Exponentiation Algorithm for Resisting Power Analysis….Pages 53-66
An ASIC Implementation of the AES SBoxes….Pages 67-78
On the Impossibility of Constructing Non-interactive Statistically-Secret Protocols from Any Trapdoor One-Way Function….Pages 79-95
The Representation Problem Based on Factoring….Pages 96-113
Ciphers with Arbitrary Finite Domains….Pages 114-130
Known Plaintext Correlation Attack against RC5….Pages 131-148
Micropayments Revisited….Pages 149-163
Proprietary Certificates….Pages 164-181
Stateless-Recipient Certified E-Mail System Based on Verifiable Encryption….Pages 182-199
RSA-Based Undeniable Signatures for General Moduli….Pages 200-217
Co-operatively Formed Group Signatures….Pages 218-235
Transitive Signature Schemes….Pages 236-243
Homomorphic Signature Schemes….Pages 244-262
GEM: A G eneric Chosen-Ciphertext Secure E ncryption M ethod….Pages 263-276
Securing “Encryption + Proof of Knowledge” in the Random Oracle Model….Pages 277-289
Nonuniform Polynomial Time Algorithm to Solve Decisional Diffie-Hellman Problem in Finite Fields under Conjecture….Pages 290-299
Secure Key-Evolving Protocols for Discrete Logarithm Schemes….Pages 300-309
Reviews
There are no reviews yet.