Detlef Hühnlein (auth.), David Naccache (eds.)3540418989, 9783540418986
Table of contents :
Faster Generation of NICE-Schnorr-Type Signatures….Pages 1-12
New Key Agreement Protocols in Braid Group Cryptography….Pages 13-27
Improving SSL Handshake Performance via Batching….Pages 28-43
From Fixed-Length Messages to Arbitrary-Length Messages Practical RSA Signature Padding Schemes….Pages 44-51
An Advantage of Low-Exponent RSA with Modulus Primes Sharing Least Significant Bits….Pages 52-62
On the Strength of Simply-Iterated Feistel Ciphers with Whitening Keys….Pages 63-69
Analysis of SHA-1 in Encryption Mode….Pages 70-83
Fast Implementation and Fair Comparison of the Final Candidates for Advanced Encryption Standard Using Field Programmable Gate Arrays….Pages 84-99
Fair e-Lotteries and e-Casinos….Pages 100-109
Secure Mobile Gambling….Pages 110-125
Formal Security Proofs for a Signature Scheme with Partial Message Recovery….Pages 126-142
The Oracle Diffie-Hellman Assumptions and an Analysis of DHIES….Pages 143-158
REACT: Rapid Enhanced-Security Asymmetric Cryptosystem Transform….Pages 159-174
Security Weaknesses in Bluetooth….Pages 176-191
Distinguishing Exponent Digits by Observing Modular Subtractions….Pages 192-207
On the Power of Misbehaving Adversaries and Security Analysis of the Original EPOC….Pages 208-222
Modular Exponentiation on Fine-Grained FPGA….Pages 223-234
Scalable Algorithm for Montgomery Multiplication and its Implementation on the Coarse-Grain Reconfigurable Chip….Pages 235-249
Software Implementation of the NIST Elliptic Curves Over Prime Fields….Pages 250-265
The Security of Hidden Field Equations (HFE)….Pages 266-281
QUARTZ, 128-Bit Long Digital Signatures….Pages 282-297
FLASH, a Fast Multivariate Signature Algorithm….Pages 298-307
Analysis of the Weil Descent Attack of Gaudry, Hess and Smart….Pages 308-318
Using Fewer Qubits in Shor’s Factorization Algorithm via Simultaneous Diophantine Approximation….Pages 319-327
Relying Party Credentials Framework….Pages 328-343
Password Authentication Using Multiple Servers….Pages 344-360
More Efficient Password-Authenticated Key Exchange….Pages 361-377
Improved Boneh-Shaw Content Fingerprinting….Pages 378-391
Efficient Asymmetric Public-Key Traitor Tracing Without Trusted Agents….Pages 392-407
Targeted Advertising … and Privacy Too….Pages 408-424
Uncheatable Distributed Computations….Pages 425-440
Forward-Secure Threshold Signature Schemes….Pages 441-456
A Cost-Effective Pay-Per-Multiplication Comparison Method for Millionaires….Pages 457-471
Reviews
There are no reviews yet.