+612 9045 4394
 
CHECKOUT
Topics in Cryptology -- CT-RSA 2004 : The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings - Tatsuaki Okamoto

Topics in Cryptology -- CT-RSA 2004

The Cryptographers' Track at the RSA Conference 2004, San Francisco, CA, USA, February 23-27, 2004, Proceedings

By: Tatsuaki Okamoto (Editor)

Paperback Published: 10th February 2004
ISBN: 9783540209966
Number Of Pages: 392

Share This Book:

Paperback

$158.39
or 4 easy payments of $39.60 with Learn more
Ships in 5 to 9 business days

The Cryptographers' Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers' Track, and it is now an established venue for presenting practical research results related to cryptography and data security. The conference received 77 submissions, and the program committee sel- ted 28 of these for presentation. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryp- graphy. Each paper was reviewed by at least three program committee members. Extended abstracts of the revised versions of these papers are in these proc- dings. The program also included two invited lectures by Dan Boneh and Silvio Micali. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection. Many of them attended the program committee meeting during the Crypto 2003 conference at the University of California, Santa Barbara.

Online encryption schemes : new security notions and constructionsp. 1
Related-key attacks on triple-DES and DESX variantsp. 15
Design of AES based on dual cipher and composite fieldp. 25
Periodic properties of counter assisted stream ciphersp. 39
A fast correlation attack via unequal error correcting LDPC codesp. 54
[kappa]-resilient identity-based encryption in the standard modelp. 67
A generic construction for intrusion-resilient public-key encryptionp. 81
A certificate-based signature schemep. 99
Identity based undeniable signaturesp. 112
Compressing Rabin signaturesp. 126
A key recovery system as secure as factoringp. 129
Server assisted signatures revisitedp. 143
Cryptanalysis of a zero-knowledge identification protocol of Eurocrypt '95p. 157
Universal re-encryption for mixnetsp. 163
Bit string commitment reductions with a non-zero ratep. 179
Improving robustness of PGP keyrings by conflict detectionp. 194
Issues of security with the Oswald-Aigner exponentiation algorithmp. 208
Hardware countermeasures against DPA - a statistical analysis of their effectivenessp. 222
Self-randomized exponentiation algorithmsp. 236
Flexible hardware design for RSA and elliptic curve cryptosystemsp. 250
High-speed modular multiplicationp. 264
Yet another sieving devicep. 278
A parallelizable enciphering modep. 292
Padding Oracle attacks on the ISO CBC mode encryption standardp. 305
A 1 Gbit/s partially unrolled architecture of hash functions SHA-1 and SHA-512p. 324
Fast verification of hash chainsp. 339
Almost ideal contrast visual cryptography with reversingp. 353
Weak fields for ECCp. 366
Author indexp. 387
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540209966
ISBN-10: 3540209964
Series: Lecture Notes in Computer Science
Audience: Professional
Format: Paperback
Language: English
Number Of Pages: 392
Published: 10th February 2004
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.5 x 15.5  x 2.11
Weight (kg): 1.25