rent-now

Rent More, Save More! Use code: ECRENTAL

5% off 1 book, 7% off 2 books, 10% off 3+ books

9783540772712

Cryptography and Coding

by
  • ISBN13:

    9783540772712

  • ISBN10:

    3540772715

  • Format: Paperback
  • Copyright: 2008-01-28
  • Publisher: Springer-Verlag New York Inc
  • Purchase Benefits
  • Free Shipping Icon Free Shipping On Orders Over $35!
    Your order must be $35 or more to qualify for free economy shipping. Bulk sales, PO's, Marketplace items, eBooks and apparel do not qualify for this offer.
  • eCampus.com Logo Get Rewarded for Ordering Your Textbooks! Enroll Now
List Price: $109.99 Save up to $90.19
  • Digital
    $42.90
    Add to Cart

    DURATION
    PRICE

Summary

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.

Table of Contents

Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noisep. 1
Galois Rings and Pseudo-random Sequencesp. 16
Finding Invalid Signatures in Pairing-Based Batchesp. 34
How to Forge a Time-Stamp Which Adobe's Acrobat Acceptsp. 54
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functionsp. 73
On the Walsh Spectrum of a New APN Functionp. 92
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxesp. 99
Cryptanalysis of the EPBC Authenticated Encryption Modep. 118
Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryptionp. 129
Algebraic Cryptanalysis of the Data Encryption Standardp. 152
Cryptographic Side-Channels from Low Power Cache Memoryp. 170
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasuresp. 185
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexityp. 204
Modified Berlekamp-Massey Algorithm for Approximating the k-Error Linear Complexity of Binary Sequencesp. 220
Efficient KEMs with Partial Message Recoveryp. 233
Randomness Reuse: Extensions and Improvementsp. 257
On the Connection Between Signcryption and One-Pass Key Establishmentp. 277
Optimised Versions of the Ate and Twisted Ate Pairingsp. 302
Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristicp. 313
Constructing Pairing-Friendly Elliptic Curves Using Grobner Basis Reductionp. 336
Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmeticp. 346
Toward Acceleration of RSA Using 3D Graphics Hardwarep. 364
Multi-key Hierarchical Identity-Based Signaturesp. 384
Verifier-Key-Flexible Universal Designated-Verifier Signaturesp. 403
Author Indexp. 423
Table of Contents provided by Blackwell. All Rights Reserved.

Supplemental Materials

What is included with this book?

The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.

The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.

Rewards Program