Book Details

Research in Cryptology : Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

Publication year: 2008

ISBN: 978-3-540-88353-1

Internet Resource: Please Login to download book


The book covers topics such as foundations of cryptology, secret-key cryptosystems and hash functions, public-key cryptosystems, cryptographic protocols, implementation of cryptosystems and their integration into secure systems, secure operating systems and trusted computing, applications such as watermarking and code obfuscation.


Subject: Computer Science, Cryptology, Systems and Data Security, Mathematics of Computing, Discrete Mathematics in Computer Science, Symbolic and Algebraic Manipulation, Computer Systems Organization and Communication Networks, Protection, achterbahn-128, algebraic attacs, complexity, cryptanalysis, cryptography, discrete logarithm, frobenius expansion, gps, hash collision, quadratic forms, reduced-round tiger, sha-256, tpy-6