Get Free Shipping on orders over $79
Progress in Cryptology - INDOCRYPT 2009 : 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings - Bimal Kumar Roy

Progress in Cryptology - INDOCRYPT 2009

10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings

By: Bimal Kumar Roy (Editor), Nicolas Sendrier (Editor)

Paperback | 24 November 2009

At a Glance

Paperback


$84.99

or 4 interest-free payments of $21.25 with

 or 

Ships in 5 to 7 business days

Post-Quantum Cryptology.- Secure Parameters for SWIFFT.- FSBday.- Key Agreement Protocols.- Reusing Static Keys in Key Agreement Protocols.- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols.- Side Channel Attacks.- Fault Analysis of Rabbit: Toward a Secret Key Leakage.- On Physical Obfuscation of Cryptographic Algorithms.- Cache Timing Attacks on Clefia.- Symmetric Cryptology.- Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode.- On the Symmetric Negabent Boolean Functions.- Improved Meet-in-the-Middle Attacks on AES.- Hash Functions.- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode.- Second Preimage Attack on SHAMATA-512.- Towards Secure and Practical MACs for Body Sensor Networks.- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions.- A Distinguisher for the Compression Function of SIMD-512.- Number Theoretic Cryptology.- Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree.- Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller.- A New Hard-Core Predicate of Paillier's Trapdoor Function.- Lightweight Cryptology.- Private Interrogation of Devices via Identification Codes.- RFID Distance Bounding Multistate Enhancement.- Two Attacks against the F f RFID Protocol.- Signature Protocols.- Efficient Constructions of Signcryption Schemes and Signcryption Composability.- On Generic Constructions of Designated Confirmer Signatures.- Verifiably Encrypted Signatures from RSA without NIZKs.- Identity Based Aggregate Signcryption Schemes.- Multiparty Computation.- Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience.- Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems.- Oblivious Multi-variate Polynomial Evaluation.

More in Data Encryption

Secure and Smart Cyber-Physical Systems - Danda B Rawat
Computer Security : Art and Science - Dariel Wyatt
Foundations of Information Security - Liam Lewis
Cybersecurity All-in-One For Dummies : For Dummies - Joseph Steinberg
Crafting an Information Security Playbook - Brandon Enright

RRP $95.00

$43.75

54%
OFF
Principles of Information Security : 7th edition - Michael E. Whitman

RRP $167.95

$129.99

23%
OFF