Plus d’un million de livres à portée de main !
Bookbot

Information security and cryptology

Paramètres

  • 366pages
  • 13 heures de lecture

En savoir plus sur le livre

This book covers a range of cryptanalysis topics and security measures in computing. It begins with an analysis of a hash function proposed at ICISC 2006 and examines reduced versions of the HIGHT block cipher from CHES 2006. The text includes a cryptanalysis of the Double-Round Quadratic Cryptosystem and presents a lightweight privacy-preserving authentication scheme for ubiquitous computing environments. It also discusses establishing RBAC-based secure interoperability in decentralized multi-domain environments and handling dynamic information release. The second section focuses on improving the time complexity of Matsui’s linear cryptanalysis and addresses passive attacks on authentication protocols for RFID. It explores side channel attacks on irregularly decimated generators and presents a secure virtual execution environment for untrusted code. Additionally, it covers liveness detection of fingerprints and improvements to the TET mode of operation. The book further delves into hash functions, analyzing local collisions for the SHA-2 family and multi-collision attacks on MD4 and 3-Pass HAVAL. It discusses differential cryptanalysis of the TSC-4 stream cipher and presents new results on impossible differential cryptanalysis of reduced AES. The text concludes with insights into weaknesses in the HAS-V compression function and security-preserving asymmetric protocol encapsulation.

Achat du livre

Information security and cryptology, Kil-Hyun Nam

Langue
Année de publication
2007
product-detail.submit-box.info.binding
(souple)
Nous vous informerons par e-mail dès que nous l’aurons retrouvé.

Modes de paiement

Personne n'a encore évalué .Évaluer