Armknecht / Lucks Research in Cryptology
Erscheinungsjahr 2012
ISBN: 978-3-642-34159-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers
E-Book, Englisch, 151 Seiten, Web PDF
Reihe: Security and Cryptology
ISBN: 978-3-642-34159-5
Verlag: Springer
Format: PDF
Kopierschutz: 1 - PDF Watermark
The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation.
Zielgruppe
Research
Autoren/Hrsg.
Weitere Infos & Material
Broadcast Attacks against Code-Based Schemes.- On the Security of Hummingbird-2 against Side Channel Cube Attacks.- Full Lattice Basis Reduction on Graphics Cards.- Breaking DVB-CSA.- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks.- G -MAC[ H, P ] – A New Universal MAC Scheme.- New Universal Hash Functions.- Cryptanalysis of TWIS Block Cipher.- RSA Vulnerabilities with Small Prime Difference.- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF (2 k ).
On theSecurity of Hummingbird-2 against Side Channel Cube Attacks.- Full Lattice Basis Reduction on Graphics Cards.- Breaking DVB-CSA.- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks.- G -MAC[ H, P ] – A New Universal MAC Scheme.- New Universal Hash Functions.- Cryptanalysis of TWIS Block Cipher.- RSA Vulnerabilities with Small Prime Difference.- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF (2 k ).



