Atjaunināt sīkdatņu piekrišanu

E-grāmata: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008

  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5350
  • Izdošanas datums: 02-Dec-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540892557
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 5350
  • Izdošanas datums: 02-Dec-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540892557

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.
Multi-Party Computation
MPC vs. SFE: Unconditional and Computational Security
1(18)
Martin Hirt
Ueli Maurer
Vassilis Zikas
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
19(18)
Zhifang Zhang
Mulan Liu
Yeow Meng Chee
San Ling
Huaxiong Wang
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
37(17)
Xiaoming Sun
Andrew Chi-Chih Yao
Christophe Tartary
Invited Talk
Some Perspectives on Complexity-Based Cryptography
54(1)
Andrew Chi-Chih Yao
Cryptographic Protocols I
A Modular Security Analysis of the TLS Handshake Protocol
55(19)
P. Morrissey
N.P. Smart
B. Warinschi
Ambiguous Optimistic Fair Exchange
74(16)
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
Compact Proofs of Retrievability
90(18)
Hovav Shacham
Brent Waters
On the Security of HB# against a Man-in-the-Middle Attack
108(17)
Khaled Ouafi
Raphael Overbeck
Serge Vaudenay
Cryptographic Hash Functions I
Hash Functions from Sigma Protocols and Improvements to VSH
125(18)
Mihir Bellare
Todor Ristov
Slide Attacks on a Class of Hash Functions
143(18)
Michael Gorski
Stefan Lucks
Thomas Peyrin
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
161(18)
Ueli Maurer
Stefano Tessaro
Cryptographic Protocols II
Universally Composable Adaptive Oblivious Transfer
179(19)
Matthew Green
Susan Hohenberger
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
198(18)
Jason Keller
Joe Kilian
Towards Robust Computation on Encrypted Data
216(18)
Manoj Prabhakaran
Mike Rosulek
Efficient Protocols for Set Membership and Range Proofs
234(19)
Jan Camenisch
Rafik Chaabouni
Abhi Shelat
Cryptographic Hash Functions II
Preimage Attacks on 3, 4 and 5-Pass HAVAL
253(19)
Yu Sasaki
Kazumaro Aoki
How to Fill Up Merkle-Damgard Hash Functions
272(18)
Kan Yasuda
Limits of Constructive Security Proofs
290(18)
Michael Backes
Dominique Unruh
Public-Key Cryptography I
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
308(18)
Goichiro Hanaoka
Kaoru Kurosawa
Twisted Edwards Curves Revisited
326(18)
Huseyin Hisil
Kenneth Koon-Ho Wong
Gary Carter
Ed Dawson
On the Validity of the &phis;-Hiding Assumption in Cryptographic Protocols
344(11)
Christian Schridde
Bernd Freisleben
Chosen Ciphertext Security with Optimal Ciphertext Overhead
355(17)
Masayuki Abe
Eike Kiltz
Tatsuaki Okamoto
Lattice-Based Cryptography
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
372(18)
Akinori Kawachi
Keisuke Tanaka
Keita Xagawa
Rigorous and Efficient Short Lattice Vectors Enumeration
390(16)
Xavier Pujol
Damien Stehle
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits
406(19)
Mathias Herrmann
Alexander May
Private-Key Cryptography
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
425(16)
Claude Carlet
Keqin Feng
An Improved Impossible Differential Attack on MISTY1
441(14)
Orr Dunkelman
Nathan Keller
Public-Key Cryptography II
Generalized Identity Based and Broadcast Encryption Schemes
455(16)
Dan Boneh
Michael Hamburg
Speeding Up the Pollard Rho Method on Prime Fields
471(18)
Jung Hee Cheon
Jin Hong
Minkyu Kim
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
489(17)
Andy Rupp
Gregor Leander
Endre Bangerter
Alexander W. Dent
Ahmad-Reza Sadeghi
OAEP Is Secure under Key-Dependent Messages
506(18)
Michael Backes
Markus Durmuth
Dominique Unruh
Analysis of Stream Ciphers
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
524(15)
Jung-Keun Lee
Dong Hoon Lee
Sangwoo Park
A New Attack on the LEX Stream Cipher
539(18)
Orr Dunkelman
Nathan Keller
Breaking the F-FCSR-H Stream Cipher in Real Time
557(14)
Martin Hell
Thomas Johansson
Author Index 571