Free shipping on orders over $99
Topics in Cryptology -- CT-RSA 2015

Topics in Cryptology -- CT-RSA 2015

The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings

by Kaisa Nyberg
Paperback
Publication Date: 25/03/2015

Share This Book:

  $111.38
or 4 easy payments of $27.84 with
afterpay
This item qualifies your order for FREE DELIVERY
Timing Attacks.- Just A Little Bit More.- Cache Storage Attacks.- Design and Analysis of Block Ciphers.- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.- Improved Attacks on Reduced-Round Camellia-128/192/256.- Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.- Membership.- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives.- Non-Interactive Zero-Knowledge Proofs of Non-Membership.- Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8.- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.- Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.- Format Oracles on OpenPGP.- Algorithms for Solving Hard Problems.- Finding Shortest Lattice Vectors in the Presence of Gaps.- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints.- Constructions of Hash Functions and Message Authentication Codes.- Hash Functions from Defective Ideal Ciphers.- Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication.- Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers.- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party.- Computation.- Authenticated Encryption.- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.- Cryptanalysis of Ascon.- Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.- Implementation Attacks on Exponentiation Algorithms.- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace.- Cold Boot Attacks in the Discrete Logarithm Setting.- Homomorphic Encryption and Its Applications.- Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
ISBN:
9783319167145
9783319167145
Category:
Computer security
Format:
Paperback
Publication Date:
25-03-2015
Language:
English
Publisher:
Springer
Country of origin:
United States
Dimensions (mm):
235x155mm
Weight:
0.8kg

This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.

Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.

Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:

ACT Metro  2 working days

NSW Metro  2 working days

NSW Rural  2 - 3 working days

NSW Remote  2 - 5 working days

NT Metro  3 - 6 working days

NT Remote  4 - 10 working days

QLD Metro  2 - 4 working days

QLD Rural  2 - 5 working days

QLD Remote  2 - 7 working days

SA Metro  2 - 5 working days

SA Rural  3 - 6 working days

SA Remote  3 - 7 working days

TAS Metro  3 - 6 working days

TAS Rural  3 - 6 working days

VIC Metro  2 - 3 working days

VIC Rural  2 - 4 working days

VIC Remote  2 - 5 working days

WA Metro  3 - 6 working days

WA Rural  4 - 8 working days

WA Remote  4 - 12 working days

Reviews

Be the first to review Topics in Cryptology -- CT-RSA 2015.