Elad Barkan, Eli Biham (auth.), Bart Preneel, Stafford Tavares (eds.)3540331085, 9783540331087
Table of contents :
Front Matter….Pages –
Conditional Estimators: An Effective Attack on A5/1….Pages 1-19
Cryptanalysis of the F-FCSR Stream Cipher Family….Pages 20-35
Fault Attacks on Combiners with Memory….Pages 36-50
New Observation on Camellia….Pages 51-64
Proving the Security of AES Substitution-Permutation Network….Pages 65-81
An Attack on CFB Mode Encryption as Used by OpenPGP….Pages 82-94
Parallelizable Authentication Trees….Pages 95-109
Improved Time-Memory Trade-Offs with Multiple Data….Pages 110-127
A Space Efficient Backdoor in RSA and Its Applications….Pages 128-143
An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism….Pages 144-158
On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners….Pages 159-174
Rekeying Issues in the MUGI Stream Cipher….Pages 175-188
Tree-Based Key Distribution Patterns….Pages 189-204
Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves….Pages 205-220
An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security….Pages 221-232
Breaking a New Hash Function Design Strategy Called SMASH….Pages 233-244
Analysis of a SHA-256 Variant….Pages 245-260
Impact of Rotations in SHA-1 and Related Hash Functions….Pages 261-275
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags….Pages 276-290
Reducing Time Complexity in RFID Systems….Pages 291-306
Accelerated Verification of ECDSA Signatures….Pages 307-318
Pairing-Friendly Elliptic Curves of Prime Order….Pages 319-331
Minimality of the Hamming Weight of the τ -NAF for Koblitz Curves and Improved Combination with Point Halving….Pages 332-344
SPA Resistant Left-to-Right Integer Recodings….Pages 345-358
Efficient FPGA-Based Karatsuba Multipliers for Polynomials over ${mathbb F}_{2}$ ….Pages 359-369
Back Matter….Pages –
Reviews
There are no reviews yet.