×







We sell 100% Genuine & New Books only!

Advances In Cryptology – Asiacrypt 2007 at Meripustak

Advances In Cryptology – Asiacrypt 2007 by Kaoru Kurosawa , Springer

Books from same Author: Kaoru Kurosawa

Books from same Publisher: Springer

Related Category: Author List / Publisher List


  • Price: ₹ 9429.00/- [ 27.00% off ]

    Seller Price: ₹ 6883.00

Estimated Delivery Time : 4-5 Business Days

Sold By: Meripustak      Click for Bulk Order

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

We deliver across all postal codes in India

Orders Outside India


Add To Cart


Outside India Order Estimated Delivery Time
7-10 Business Days


  • We Deliver Across 100+ Countries

  • MeriPustak’s Books are 100% New & Original
  • General Information  
    Author(s)Kaoru Kurosawa
    PublisherSpringer
    ISBN9783540768999
    Pages583
    BindingPaperback
    LanguageEnglish
    Publish YearDecember 2007

    Description

    Springer Advances In Cryptology – Asiacrypt 2007 by Kaoru Kurosawa

    This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis._x000D_ _x000D_ Number Theory and Elliptic Curve.- A Kilobit Special Number Field Sieve Factorization.- When e-th Roots Become Easier Than Factoring.- Faster Addition and Doubling on Elliptic Curves.- Protocol.- A Non-interactive Shuffle with Pairing Based Verifiability.- On Privacy Models for RFID.- Invited Talk I.- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust.- A Simple Variant of the Merkle-Damgard Scheme with a Permutation.- Seven-Property-Preserving Iterated Hashing: ROX.- How to Build a Hash Function from Any Collision-Resistant Function.- Fully Anonymous Group Signatures Without Random Oracles.- Group Encryption.- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys.- Boosting Merkle-Damgard Hashing for Message Authentication.- On Efficient Message Authentication Via Block Cipher Design Techniques.- Symmetric Key Cryptography on Modern Graphics Hardware.- Multiparty Computation I.- Blind Identity-Based Encryption and Simulatable Oblivious Transfer.- Multi-party Indirect Indexing and Applications.- Two-Party Computing with Encrypted Data.- Known-Key Distinguishers for Some Block Ciphers.- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.- On Tweaking Luby-Rackoff Blockciphers.- Multiparty Computation II.- Secure Protocols with Asymmetric Trust.- Simple and Efficient Perfectly-Secure Asynchronous MPC.- Efficient Byzantine Agreement with Faulty Minority.- Information-Theoretic Security Without an Honest Majority.- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.- Anonymous Quantum Communication.- Invited Talk II.- Authenticated Key Exchange and Key Encapsulation in the Standard Model.- Miniature CCA2 PK Encryption: Tight Security Without Redundancy.- Bounded CCA2-Secure Encryption.- Relations Among Notions of Non-malleability for Encryption.- Cryptanalysis of the Tiger Hash Function.- Cryptanalysis of Grindahl.- A Key Recovery Attack on Edon80._x000D_



    Book Successfully Added To Your Cart