000 05086nam a22005775i 4500
003 DE-He213
005 20191013145255.0
007 cr nn 008mamaa
008 100301s2008 gw | s |||| 0|eng d
020 6 4 _a9783540792635
_9978-3-540-79263-5
024 8 7 _a10.1007/978-3-540-79263-5
_2doi
050 8 4 _a Libro electrónico
072 8 7 _aURY
_2bicssc
072 8 7 _aCOM053000
_2bisacsh
082 _a005.82
_223
100 8 1 _aMalkin, Tal.
_eeditor.
_9141080
245 9 7 _aTopics in Cryptology CT-RSA 2008
_h[electronic resource] :
_bThe Cryptographers Track at the RSA Conference 2008, San Francisco, CA, USA, April 8-11, 2008. Proceedings /
_cedited by Tal Malkin.
001 000065085
300 6 4 _bonline resource.
490 8 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4964
505 8 0 _aHash Function Cryptanalysis -- Security of MD5 Challenge and Response: Extension of APOP Password Recovery Attack -- Cryptanalysis of a Hash Function Based on Quasi-cyclic Codes -- Linear-XOR and Additive Checksums Dont Protect Damgrd-Merkle Hashes from Generic Attacks -- Cryptographic Building Blocks -- Efficient Fully-Simulatable Oblivious Transfer -- Separation Results on the ǣOne-Moreǥ Computational Problems -- Fairness in Secure Computation -- An Efficient Protocol for Fair Secure Two-Party Computation -- Efficient Optimistic Fair Exchange Secure in the Multi-user Setting and Chosen-Key Model without Random Oracles -- Legally-Enforceable Fairness in Secure Two-Party Computation -- Message Authentication Codes -- Security of NMAC and HMAC Based on Non-malleability -- Aggregate Message Authentication Codes -- Improved AES Implementations -- Boosting AES Performance on a Tiny Processor Core -- A Fast and Cache-Timing Resistant Implementation of the AES -- Public Key Encryption with Special Properties -- Identity-Based Threshold Key-Insulated Encryption without Random Oracles -- CCA2 Secure IBE: Standard Model Efficiency through Authenticated Symmetric Encryption -- Public-KeyEncryptionwith Non-interactiveOpening -- Side Channel Cryptanalysis -- A Vulnerability in RSA Implementations Due to Instruction Cache Analysis and Its Demonstration on OpenSSL -- Fault Analysis Study of IDEA -- Susceptibility of UHF RFID Tags to Electromagnetic Analysis -- Cryptography for Limited Devices -- Online/Offline Signature Schemes for Devices with Limited Computing Capabilities -- RFID Security: Tradeoffs between Security and Efficiency -- Invited Talk -- Program Obfuscation and One-Time Programs -- Key Exchange -- Efficient Two-Party Password-Based Key Exchange Protocols in the UC Framework -- Beyond Secret Handshakes: Affiliation-Hiding Authenticated Key Exchange -- Cryptanalysis -- Improving the Efficiency of Impossible Differential Cryptanalysis of Reduced Camellia and MISTY1 -- Small Secret Key Attack on a Variant of RSA (Due to Takagi) -- Cryptographic Protocols -- Super-Efficient Verification of Dynamic Outsourced Databases -- A Latency-Free Election Scheme.
520 6 4 _aThis book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2008, CT-RSA 2008, held in San Francisco, CA, USA in April 2008. The 26 revised full papers presented together with the abstract of 1 invited talk were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message authentication codes, improved aes implementations, public key encryption with special properties, side channel cryptanalysis, cryptography for limited devices, invited talk, key exchange, cryptanalysis, and cryptographic protocols.
650 8 0 _aComputer science.
_9141081
650 8 0 _aComputer Communication Networks.
_9141082
650 8 0 _aData protection.
_98981
650 8 0 _aData encryption (Computer science).
_9141083
650 8 0 _aComputer software.
_910118
650 8 0 _aComputational complexity.
_98597
650 8 0 _aInformation Systems.
_9141084
650 _aComputer Science.
_9141085
650 _aData Encryption.
_9141086
650 _aDiscrete Mathematics in Computer Science.
_98602
650 _aSystems and Data Security.
_98985
650 _aManagement of Computing and Information Systems.
_99204
650 _aAlgorithm Analysis and Problem Complexity.
_910120
650 _aComputer Communication Networks.
_9141082
710 8 2 _aSpringerLink (Online service)
_9141087
773 8 0 _tSpringer eBooks
776 _iPrinted edition:
_z9783540792628
830 8 0 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v4964
_9141088
856 _uhttp://dx.doi.org/10.1007/978-3-540-79263-5
_zde clik aquí para ver el libro electrónico
264 8 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg,
_c2008.
336 6 4 _atext
_btxt
_2rdacontent
337 6 4 _acomputer
_bc
_2rdamedia
338 6 4 _aonline resource
_bcr
_2rdacarrier
347 6 4 _atext file
_bPDF
_2rda
516 6 4 _aZDB-2-SCS
516 6 4 _aZDB-2-LNC
999 _c64815
_d64815
942 _c05