Research in Cryptology

Research in Cryptology

Second Western European Workshop, WEWoRC 2007, Bochum, Germany, July 4-6, 2007, Revised Selected Papers

Wolf, Christopher; Sadeghi, Ahmad-Reza; Lucks, Stefan

Springer-Verlag Berlin and Heidelberg GmbH & Co. KG

10/2008

153

Mole

Inglês

9783540883524

15 a 20 dias

454

Descrição não disponível.
A Privacy Protection Scheme for a Scalable Control Method in Context-Dependent Services.- The GPS Identification Scheme Using Frobenius Expansions.- Searching for Messages Conforming to Arbitrary Sets of Conditions in SHA-256.- Efficient Hash Collision Search Strategies on Special-Purpose Hardware.- Cryptography Based on Quadratic Forms: Complexity Considerations.- Towards a Concrete Security Proof of Courtois, Finiasz and Sendrier Signature Scheme.- Cryptanalysis of MOR and Discrete Logarithms in Inner Automorphism Groups.- Preimages for Reduced-Round Tiger.- Specific S-Box Criteria in Algebraic Attacks on Block Ciphers with Several Known Plaintexts.- Combiner Driven Management Models and Their Applications.- New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B.- Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation.
Protection;achterbahn-128;algebraic attacs;complexity;cryptanalysis;cryptography;discrete logarithm;frobenius expansion;gps;hash collision;quadratic forms;reduced-round tiger;sha-256;tpy-6