Publication Date: 2008
ISBN: 978-3-540-79263-5
Internet Resource: Please Login to download book
This book includes : hash function cryptanalysis, cryptographic building blocks, fairness in secure computation, message authentication codes, improved aes implementations, public key encryption with special properties, side channel cryptanalysis, cryptography for limited devices, invited talk, key exchange, cryptanalysis, and cryptographic protocols.
Subject: Computer Science, Cryptology, Discrete Mathematics in Computer Science, Systems and Data Security, Management of Computing and Information Systems, Algorithm Analysis and Problem Complexity, Computer Communication Networks, AES, CCA encryption, Message Authentication Code, Radio-Frequency Identification (RFID), authentication, block ciphers, calculus, cryptanalysis, cryptography, cryptosystems, database, digital signatures, fault analysis, verification,