
More about the book
The content covers various aspects of cryptography and network security, including symmetric key encryption and cryptanalysis techniques. It discusses a generalized unbalanced Feistel network structure and explores improved algebraic cryptanalysis methods for QUAD, Bivium, and Trivium through graph partitioning on equation systems. The text delves into multidimensional linear cryptanalysis and side-channel analysis of the K2 stream cipher, as well as unbiased linear approximations and hash functions. Distinguishers for Hamsi-256's compression function and output transformation are analyzed, along with second-preimage analysis of reduced SHA-1 and observations on indifferentiability. In public key cryptography, topics include adaptive and composable non-committing encryptions, relations among complete non-malleability notions, and strong knowledge extractors for public-key encryption schemes. A multi-trapdoor commitment scheme based on the RSA assumption and an identity-based chameleon hash scheme without key exposure are also presented. Security models for unidirectional proxy re-signature and estimates for quadratic field-based cryptosystems are discussed. Protocols covered include one-time-password-authenticated key exchange, predicate-based key exchange, and attribute-based authenticated key exchange, along with optimally tight security proofs for hash-then-publish timestamping. It also addresses additive combinatorics an
Book purchase
Information security and privacy, Ron Steinfeld
- Language
- Released
- 2010
- product-detail.submit-box.info.binding
- (Paperback)
Payment methods
No one has rated yet.