Muutke küpsiste eelistusi

E-raamat: Advances in Cryptology - ASIACRYPT 2008: 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008

  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 5350
  • Ilmumisaeg: 02-Dec-2008
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540892557
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Security and Cryptology 5350
  • Ilmumisaeg: 02-Dec-2008
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540892557

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.
Multi-Party Computation
MPC vs. SFE: Unconditional and Computational Security
1(18)
Martin Hirt
Ueli Maurer
Vassilis Zikas
Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes
19(18)
Zhifang Zhang
Mulan Liu
Yeow Meng Chee
San Ling
Huaxiong Wang
Graph Design for Secure Multiparty Computation over Non-Abelian Groups
37(17)
Xiaoming Sun
Andrew Chi-Chih Yao
Christophe Tartary
Invited Talk
Some Perspectives on Complexity-Based Cryptography
54(1)
Andrew Chi-Chih Yao
Cryptographic Protocols I
A Modular Security Analysis of the TLS Handshake Protocol
55(19)
P. Morrissey
N.P. Smart
B. Warinschi
Ambiguous Optimistic Fair Exchange
74(16)
Qiong Huang
Guomin Yang
Duncan S. Wong
Willy Susilo
Compact Proofs of Retrievability
90(18)
Hovav Shacham
Brent Waters
On the Security of HB# against a Man-in-the-Middle Attack
108(17)
Khaled Ouafi
Raphael Overbeck
Serge Vaudenay
Cryptographic Hash Functions I
Hash Functions from Sigma Protocols and Improvements to VSH
125(18)
Mihir Bellare
Todor Ristov
Slide Attacks on a Class of Hash Functions
143(18)
Michael Gorski
Stefan Lucks
Thomas Peyrin
Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography
161(18)
Ueli Maurer
Stefano Tessaro
Cryptographic Protocols II
Universally Composable Adaptive Oblivious Transfer
179(19)
Matthew Green
Susan Hohenberger
A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting
198(18)
Jason Keller
Joe Kilian
Towards Robust Computation on Encrypted Data
216(18)
Manoj Prabhakaran
Mike Rosulek
Efficient Protocols for Set Membership and Range Proofs
234(19)
Jan Camenisch
Rafik Chaabouni
Abhi Shelat
Cryptographic Hash Functions II
Preimage Attacks on 3, 4 and 5-Pass HAVAL
253(19)
Yu Sasaki
Kazumaro Aoki
How to Fill Up Merkle-Damgard Hash Functions
272(18)
Kan Yasuda
Limits of Constructive Security Proofs
290(18)
Michael Backes
Dominique Unruh
Public-Key Cryptography I
Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption
308(18)
Goichiro Hanaoka
Kaoru Kurosawa
Twisted Edwards Curves Revisited
326(18)
Huseyin Hisil
Kenneth Koon-Ho Wong
Gary Carter
Ed Dawson
On the Validity of the &phis;-Hiding Assumption in Cryptographic Protocols
344(11)
Christian Schridde
Bernd Freisleben
Chosen Ciphertext Security with Optimal Ciphertext Overhead
355(17)
Masayuki Abe
Eike Kiltz
Tatsuaki Okamoto
Lattice-Based Cryptography
Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems
372(18)
Akinori Kawachi
Keisuke Tanaka
Keita Xagawa
Rigorous and Efficient Short Lattice Vectors Enumeration
390(16)
Xavier Pujol
Damien Stehle
Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits
406(19)
Mathias Herrmann
Alexander May
Private-Key Cryptography
An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity
425(16)
Claude Carlet
Keqin Feng
An Improved Impossible Differential Attack on MISTY1
441(14)
Orr Dunkelman
Nathan Keller
Public-Key Cryptography II
Generalized Identity Based and Broadcast Encryption Schemes
455(16)
Dan Boneh
Michael Hamburg
Speeding Up the Pollard Rho Method on Prime Fields
471(18)
Jung Hee Cheon
Jin Hong
Minkyu Kim
Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems
489(17)
Andy Rupp
Gregor Leander
Endre Bangerter
Alexander W. Dent
Ahmad-Reza Sadeghi
OAEP Is Secure under Key-Dependent Messages
506(18)
Michael Backes
Markus Durmuth
Dominique Unruh
Analysis of Stream Ciphers
Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks
524(15)
Jung-Keun Lee
Dong Hoon Lee
Sangwoo Park
A New Attack on the LEX Stream Cipher
539(18)
Orr Dunkelman
Nathan Keller
Breaking the F-FCSR-H Stream Cipher in Real Time
557(14)
Martin Hell
Thomas Johansson
Author Index 571