Bits and Booleans.- Semi-bent Functions from Oval Polynomials.- Efficient Generation of Elementary Sequences.- Homomorphic Encryption.- On the Homomorphic Computation of Symmetric Cryptographic Primitives.- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.- On the Relationship between Functional Encryption, Obfuscation and Fully Homomorphic Encryption.- Codes and Applications.- On Minimal and Quasi-minimal Linear Codes.- A Code-Based Undeniable Signature Scheme.- Cryptanalysis.- Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent and the Wrong-Key Randomization Hypothesis.- Differential Cryptanalysis of Keccak Variants.- Recovering Private Keys Generated with Weak PRNGs.- Protecting against Leakage.- A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme.- High-Order Masking by Using Coding Theory and Its Application to AES.- Hash Functions.- Hashing Mode Using a Lightweight Blockcipher.- Indifferentiability of Double Length Compression Functions.- Security Amplification against Meet-in-the-Middle Attacks Using Whitening.- Key Issues.- Secure Key Management in the Cloud.- Estimating Key Sizes for High Dimensional Lattice-Based Systems.- Sub-linear Blind Ring Signatures without Random Oracles.- Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption.- Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings.
"synopsis" may belong to another edition of this title.
(No Available Copies)
Search Books: Create a WantCan't find the book you're looking for? We'll keep searching for you. If one of our booksellers adds it to AbeBooks, we'll let you know!
Create a Want