Timing Attacks.- Just A Little Bit More.- Cache Storage Attacks.- Design and Analysis of Block Ciphers.- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows.- Improved Attacks on Reduced-Round Camellia-128/192/256.- Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings.- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts.- Membership.- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives.- Non-Interactive Zero-Knowledge Proofs of Non-Membership.- Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8.- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON.- Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption.- Format Oracles on OpenPGP.- Algorithms for Solving Hard Problems.- Finding Shortest Lattice Vectors in the Presence of Gaps.- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints.- Constructions of Hash Functions and Message Authentication Codes.- Hash Functions from Defective Ideal Ciphers.- Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication.- Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers.- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party.- Computation.- Authenticated Encryption.- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption.- Cryptanalysis of Ascon.- Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions.- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption.- Implementation Attacks on Exponentiation Algorithms.- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace.- Cold Boot Attacks in the Discrete Logarithm Setting.- Homomorphic Encryption and Its Applications.- Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
- ISBN:
- 9783319167145
- 9783319167145
-
Category:
- Computer security
- Format:
- Paperback
- Publication Date:
-
25-03-2015
- Language:
- English
- Publisher:
- Springer
- Country of origin:
- United States
- Dimensions (mm):
- 235x155mm
- Weight:
- 0.8kg
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
ACT Metro 2 working days
NSW Metro 2 working days
NSW Rural 2 - 3 working days
NSW Remote 2 - 5 working days
NT Metro 3 - 6 working days
NT Remote 4 - 10 working days
QLD Metro 2 - 4 working days
QLD Rural 2 - 5 working days
QLD Remote 2 - 7 working days
SA Metro 2 - 5 working days
SA Rural 3 - 6 working days
SA Remote 3 - 7 working days
TAS Metro 3 - 6 working days
TAS Rural 3 - 6 working days
VIC Metro 2 - 3 working days
VIC Rural 2 - 4 working days
VIC Remote 2 - 5 working days
WA Metro 3 - 6 working days
WA Rural 4 - 8 working days
WA Remote 4 - 12 working days
Share This Book: