LEADER 06531nam 22008415 450 001 996465545703316 005 20200701114140.0 010 $a3-642-00862-3 024 7 $a10.1007/978-3-642-00862-7 035 $a(CKB)1000000000746066 035 $a(SSID)ssj0000320427 035 $a(PQKBManifestationID)11263738 035 $a(PQKBTitleCode)TC0000320427 035 $a(PQKBWorkID)10247400 035 $a(PQKB)10166785 035 $a(DE-He213)978-3-642-00862-7 035 $a(MiAaPQ)EBC3064162 035 $a(PPN)134131142 035 $a(EXLCZ)991000000000746066 100 $a20100301d2009 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aTopics in Cryptology - CT-RSA 2009$b[electronic resource] $eThe Cryptographers' Track at the RSA Conference 2009, San Francisco,CA, USA, April 20-24, 2009, Proceedings /$fedited by Marc Fischlin 205 $a1st ed. 2009. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2009. 215 $a1 online resource (XI, 482 p.) 225 1 $aSecurity and Cryptology ;$v5473 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-00861-5 320 $aIncludes bibliographical references and index. 327 $aIdentity-Based Encryption -- Adaptive-ID Secure Revocable Identity-Based Encryption -- An Efficient Encapsulation Scheme from Near Collision Resistant Pseudorandom Generators and Its Application to IBE-to-PKE Transformations -- Universally Anonymous IBE Based on the Quadratic Residuosity Assumption -- Protocol Analysis -- Attacks on the DECT Authentication Mechanisms -- Comparison-Based Key Exchange and the Security of the Numeric Comparison Mode in Bluetooth v2.1 -- Two-Party Protocols -- Key Insulation and Intrusion Resilience over a Public Channel -- Statistically Hiding Sets -- Adaptively Secure Two-Party Computation with Erasures -- More Than Signatures -- Short Redactable Signatures Using Random Trees -- Divisible On-Line/Off-Line Signatures -- Collisions for Hash Functions -- Speeding up Collision Search for Byte-Oriented Hash Functions -- Hard and Easy Components of Collision Search in the Zémor-Tillich Hash Function: New Attacks and Reduced Variants with Equivalent Security -- Cryptanalysis -- A Statistical Saturation Attack against the Block Cipher PRESENT -- Practical Attacks on Masked Hardware -- Cryptanalysis of CTC2 -- Alternative Encryption -- A CCA2 Secure Public Key Encryption Scheme Based on the McEliece Assumptions in the Standard Model -- Square, a New Multivariate Encryption Scheme -- Privacy and Anonymity -- Communication-Efficient Private Protocols for Longest Common Subsequence -- Key-Private Proxy Re-encryption -- Dynamic Universal Accumulators for DDH Groups and Their Application to Attribute-Based Anonymous Credential Systems -- Effciency Improvements -- Practical Short Signature Batch Verification -- Single-Layer Fractal Hash Chain Traversal with Almost Optimal Complexity -- Recursive Double-Size Modular Multiplications without Extra Cost for Their Quotients -- Multi-Party Protocols -- Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values -- Local Sequentiality Does Not Help for Concurrent Composition -- Security of Encryption Schemes -- Breaking and Repairing Damgård et al. Public Key Encryption Scheme with Non-interactive Opening -- Strengthening Security of RSA-OAEP -- Faults and Countermeasures -- Fault Attacks on RSA Public Keys: Left-To-Right Implementations Are Also Vulnerable -- Fault Analysis Attack against an AES Prototype Chip Using RSL -- Countermeasures and Faults -- Evaluation of the Detached Power Supply as Side-Channel Analysis Countermeasure for Passive UHF RFID Tags -- Securing RSA against Fault Analysis by Double Addition Chain Exponentiation. 330 $aThis book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2009, CT-RSA 2009, held in San Francisco, CA, USA in April 2009. The 31 revised full papers presented were carefully reviewed and selected from 93 submissions. The papers are organized in topical sections on identity-based encryption, protocol analysis, two-party protocols, more than signatures, collisions for hash functions, cryptanalysis, alternative encryption, privacy and anonymity, efficiency improvements, multi-party protocols, security of encryption schemes as well as countermeasures and faults. 410 0$aSecurity and Cryptology ;$v5473 606 $aData encryption (Computer science) 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aComputer security 606 $aComputer communication systems 606 $aAlgorithms 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 608 $aKongress.$2swd 608 $aSan Francisco (Calif., 2009)$2swd 615 0$aData encryption (Computer science). 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 0$aComputer security. 615 0$aComputer communication systems. 615 0$aAlgorithms. 615 14$aCryptology. 615 24$aCoding and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSystems and Data Security. 615 24$aComputer Communication Networks. 615 24$aAlgorithm Analysis and Problem Complexity. 676 $a005.82 686 $aDAT 465f$2stub 686 $aSS 4800$2rvk 702 $aFischlin$b Marc$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aCryptographers' Track at RSA Conference 906 $aBOOK 912 $a996465545703316 996 $aTopics in Cryptology – CT-RSA 2009$9774146 997 $aUNISA