Meer dan een miljoen boeken binnen handbereik!
Bookbot

Xuejia Lai

    Advances in cryptology
    Information security and cryptology
    Forensics in telecommunications, information and multimedia
    Information security
    On the design and security of block ciphers
    • "Secret-key block ciphers are the subject of this work. The design and security of block ciphers, together with their application in hashing techniques, are considered. In particular, iterated block ciphers that are based on iterating a weak round function several times are considered. Four basic constructions for the round function of an iterated cipher are studied."--P. iii.

      On the design and security of block ciphers
    • This book constitutes the refereed proceedings of the 14th International Conference on Information Security, ISC 2011, held in Xi'an, China, in October 2011. The 25 revised full papers were carefully reviewed and selected from 95 submissions. The papers are organized in topical sections on attacks; protocols; public-key cryptosystems; network security; software security; system security; database security; privacy; digital signatures.

      Information security
    • This book constitutes the thoroughly refereed post-conference proceedings of the Third International ICST Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia, E-Forensics 2010, held in Shanghai, China, in November 2010. The 32 revised full papers presented were carefully reviewed and selected from 42 submissions in total. These, along with 5 papers from a collocated workshop of E-Forensics Law, cover a wide range of topics including digital evidence handling, data carving, records tracing, device forensics, data tamper identification, and mobile device locating.

      Forensics in telecommunications, information and multimedia
    • Information security and cryptology

      • 524bladzijden
      • 19 uur lezen

      This book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues.

      Information security and cryptology
    • The book covers a wide range of topics in cryptography and security, including attacks on hash functions, with a focus on SHA-1 and SHA-0, and explores forgery and key-recovery attacks on HMAC and NMAC. It delves into stream ciphers and Boolean functions, presenting a new guess-and-determine attack on self-shrinking generators and discussing the security of stream ciphers based on arrays. The construction and analysis of Boolean functions with maximum algebraic immunity are also examined. Biometric security is addressed, including secure sketch techniques for biometric templates and the application of the 2-adic CM method for genus 2 curves in cryptography. The text discusses identity-based schemes, including HIBE with short public parameters, and examines forward-secure and searchable broadcast encryption with compact ciphertexts. Public-key schemes are analyzed, focusing on the security of RSA-based pseudorandom generators and OAEP. The relationship between plaintext awareness and message hiding in the standard model is explored, alongside the equivalence of RSA and factoring in generic ring algorithms. The construction of hash functions is discussed, including security analyses of popular hash functions and new domain extension techniques. Protocols are presented, such as a scalable password-based group key exchange and weaknesses in certain oblivious transfer protocols. The book also covers block ciphers, including n

      Advances in cryptology