Digital Signatures | |
A Pre-computable Signature Scheme with Efficient Verification for RFID | p. 1 |
Redactable Signatures for Independent Removal of Structure and Content | p. 17 |
Public Key Cryptography | |
Improved Efficiency of Chosen Ciphertext Secure Encryption from Factoring | p. 34 |
Deniable Encryptions Secure against Adaptive Chosen Ciphertext Attack | p. 46 |
Computational Soundness of Indistinguishability Properties without Computable Parsing | p. 63 |
Cryptanalysis I: Differential Attacks | |
New Impossible Differential Attacks on Camellia | p. 80 |
Impossible Differential Attacks on Reduced-Round LBlock | p. 97 |
New Truncated Differential Cryptanalysis on 3D Block Cipher | p. 109 |
Applications I.i: Oblivious Transfer | |
T-out-of-n Distributed Oblivious Transfer Protocols in Non-adaptive and Adaptive Settings | p. 126 |
A Code-Based 1-out-of-N Oblivious Transfer Based on McEliece Assumptions | p. 144 |
Applications I.ii: Internet Security (Works-in-Progress) | |
Towards Fine-Grained Access Control on Browser Extensions | p. 158 |
Enhanced STE3D-CAP: A Novel 3D CAPTCHA Family | p. 170 |
Key Management | |
High-Entropy Visual Identification for Touch Screen Devices | p. 182 |
A Framework for Security Analysis of Key Derivation Functions | p. 199 |
Applied Cryptography | |
On the Equivalence of Two Definitions of Visual Cryptography Scheme | p. 217 |
Key Length Estimation of Pairing-Based Cryptosystems Using ¿T Pairing | p. 228 |
Lightweight Intergrity for XOR Network Coding in Wireless Sensor Networks | p. 245 |
Applications II.i: PINs | |
iPIN and mTAN for Secure eID Applications | p. 259 |
Fundamentals (Works-in-Progress) | |
Secure Distributed Computation of the Square Root and Applications | p. 277 |
Prevent Kernel Return-Oriented Programming Attacks Using Hardware Virtualization | p. 289 |
Fault Attacks and Key Recovery | |
Structure-Based RSA Fault Attacks | p. 301 |
Fault Analysis of the KATAN Family of Block Ciphers | p. 319 |
Biclique Cryptanalysis of Reduced-Round Piccolo Block Cipher | p. 337 |
On the CCA-1 Security of Somewhat Homomorphic Encryption over the Integers | p. 353 |
Key Recovery (Works-in-Progress) | |
Partial Key Exposure on RSA with Private Exponents Larger Than N | p. 369 |
Linear Cryptanalysis of Reduced-Round ICEBERG | p. 381 |
Overcoming Significant Noise: Correlation-Template-Induction Attack | p. 393 |
Author Index | p. 405 |
Table of Contents provided by Ingram. All Rights Reserved. |
The New copy of this book will include any supplemental materials advertised. Please check the title of the book to determine if it should include any access cards, study guides, lab manuals, CDs, etc.
The Used, Rental and eBook copies of this book are not guaranteed to include any supplemental materials. Typically, only the book itself is included. This is true even if the title states it includes any access cards, study guides, lab manuals, CDs, etc.