Publication Date: 2008
ISBN: 978-3-540-68164-9
Internet Resource: Please Login to download book
The papers are organized in topical sections on AES, analysis of RFID protocols, cryptographic protocols, authentication, public-key cryptography, pseudorandomness, analysis of stream ciphers, hash functions, broadcast encryption, and implementation.
Subject: Computer Science, AES, anonymity, authenticated encryption, authentication, biometrics, block cipher, crpytographic protocols, cryptanalysis, cryptography, cypher implementation, elliptic curves, fourier transform, keyed hash functions, pairing-b, radio-frequency identification (RFID), Coding and Information Theory, Computer Communication Networks, Systems and Data Security, Algorithm Analysis and Problem Complexity, Discrete Mathematics in Computer Science