
Mehr zum Buch
This book covers a range of cryptanalysis topics and security measures in computing. It begins with an analysis of a hash function proposed at ICISC 2006 and examines reduced versions of the HIGHT block cipher from CHES 2006. The text includes a cryptanalysis of the Double-Round Quadratic Cryptosystem and presents a lightweight privacy-preserving authentication scheme for ubiquitous computing environments. It also discusses establishing RBAC-based secure interoperability in decentralized multi-domain environments and handling dynamic information release. The second section focuses on improving the time complexity of Matsui’s linear cryptanalysis and addresses passive attacks on authentication protocols for RFID. It explores side channel attacks on irregularly decimated generators and presents a secure virtual execution environment for untrusted code. Additionally, it covers liveness detection of fingerprints and improvements to the TET mode of operation. The book further delves into hash functions, analyzing local collisions for the SHA-2 family and multi-collision attacks on MD4 and 3-Pass HAVAL. It discusses differential cryptanalysis of the TSC-4 stream cipher and presents new results on impossible differential cryptanalysis of reduced AES. The text concludes with insights into weaknesses in the HAS-V compression function and security-preserving asymmetric protocol encapsulation.
Buchkauf
Information security and cryptology, Kil-Hyun Nam
- Sprache
- Erscheinungsdatum
- 2007
- product-detail.submit-box.info.binding
- (Paperback)
Lieferung
Zahlungsmethoden
Keiner hat bisher bewertet.