| ISBN | 出版时间 | 包装 | 开本 | 页数 | 字数 |
|---|---|---|---|---|---|
| 未知 | 暂无 | 暂无 | 未知 | 0 | 暂无 |
Invited Talk
Whither Cryptography?
Symmetric Cryptography: Attacks
Non-randomness in eSTREAM Candidates Salsa20 and TSC-4
Differential and Rectangle Attacks on Reduced-Round SHACAL-1
Algebraic Attacks on Clock-Controlled Cascade Ciphers
An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication
Hash Functions
Update on Tiger
RC4-Hash: A New Hash Function Based on RC4
Security of VSH in the Real World
Provable Security:Key Agreement
Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols
On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols
Invited Talk
Another Look at "Provable Security". II
Provable Security: Public Key Cryptography
Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions
General Conversion for Obtaining Strongly Existentially Unforgeable Signatures
Conditionally Verifiable Signature
Constant Phase Bit Optimal Protocols fox Perfectly Reliable and Secure Message Transmission
Symmetric Cryptography: Design
Using Wiedemann's Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks
……
Modes of Operation and Message Authentication Codes
Fast Implementation of Public Key Cryptogyaphy
ID-Based Cryptography
Embedded System and Side Channel Attacks
Author Index