Analysis of the Statistical Cipher Feedback Mode of Block Ciphers
IEEE Transactions on Computers
The Design and Implementation of a Transparent Cryptographic File System for UNIX
Proceedings of the FREENIX Track: 2001 USENIX Annual Technical Conference
Information sharing across private databases
Proceedings of the 2003 ACM SIGMOD international conference on Management of data
Protecting digital archives at the Greek Orthodox Archdiocese of America
Proceedings of the 3rd ACM workshop on Digital rights management
A security scheme for protecting security policies in firewall
ACM SIGOPS Operating Systems Review
Order preserving encryption for numeric data
SIGMOD '04 Proceedings of the 2004 ACM SIGMOD international conference on Management of data
SeRLoc: secure range-independent localization for wireless sensor networks
Proceedings of the 3rd ACM workshop on Wireless security
Cryptography and security protocols course for undergraduate IT students
ACM SIGCSE Bulletin
Security evaluation of email encryption using random noise generated by LCG
Journal of Computing Sciences in Colleges
Encyclopedia of Computer Science
SeRLoc: Robust localization for wireless sensor networks
ACM Transactions on Sensor Networks (TOSN)
Teaching cryptography to undergraduate students in small liberal art schools
InfoSecCD '05 Proceedings of the 2nd annual conference on Information security curriculum development
Some Observations on the Theory of Cryptographic Hash Functions
Designs, Codes and Cryptography
Modeling and verification of cryptographic protocols using coloured petri nets and design/CPN
Nordic Journal of Computing
ROPE: robust position estimation in wireless sensor networks
IPSN '05 Proceedings of the 4th international symposium on Information processing in sensor networks
Preventing the capture of sensitive information
Proceedings of the 43rd annual Southeast regional conference - Volume 2
Affinity of permutations of F2n
Discrete Applied Mathematics - Special issue: Coding and cryptography
Type systems equivalent to data-flow analyses for imperative languages
Theoretical Computer Science - Applied semantics
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Future Generation Computer Systems
MICROCAST: smart card based (micro)pay-per-view for multicast services
CARDIS'02 Proceedings of the 5th conference on Smart Card Research and Advanced Application Conference - Volume 5
On the design of error-correcting ciphers
EURASIP Journal on Wireless Communications and Networking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Decentralized group key management for dynamic networks using proxy cryptography
Proceedings of the 3rd ACM workshop on QoS and security for wireless and mobile networks
Information Processing and Management: an International Journal
Vision paper: enabling privacy for the paranoids
VLDB '04 Proceedings of the Thirtieth international conference on Very large data bases - Volume 30
An efficient threshold verifiable multi-secret sharing
Computer Standards & Interfaces
Defense against outside attacks in wireless sensor networks
Computer Communications
New efficient and practical verifiable multi-secret sharing schemes
Information Sciences: an International Journal
Digital design of a cryptographic card (LAM) embedded smart card reader
ICCOMP'07 Proceedings of the 11th WSEAS International Conference on Computers
Hash chains with diminishing ranges for sensors
International Journal of High Performance Computing and Networking
Provably secure fail-stop signature schemes based on RSA
International Journal of Wireless and Mobile Computing
Cryptanalysis of an elliptic curve cryptosystem for wireless sensor networks
International Journal of Security and Networks
A web transaction security scheme based on disposable credit card numbers
International Journal of Electronic Security and Digital Forensics
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Secure architecture for the digital rights management of the m-content
ISP'06 Proceedings of the 5th WSEAS International Conference on Information Security and Privacy
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
Computer Communications
A new key exchange scheme based on extended Chebyshev polynomials
AMCOS'05 Proceedings of the 4th WSEAS International Conference on Applied Mathematics and Computer Science
Towards a library of composable models to estimate the performance of security solutions
WOSP '08 Proceedings of the 7th international workshop on Software and performance
A unified architecture for a public key cryptographic coprocessor
Journal of Systems Architecture: the EUROMICRO Journal
A multisecret sharing scheme for color images based on cellular automata
Information Sciences: an International Journal
Secure mobile electronic card used in medical services
ACC'08 Proceedings of the WSEAS International Conference on Applied Computing Conference
Research on a Novel Hashing Stream Cipher
Computational Intelligence and Security
Revisiting Wiener's Attack --- New Weak Keys in RSA
ISC '08 Proceedings of the 11th international conference on Information Security
Design and implementation of a cipher system (LAM)
WSEAS Transactions on Computers
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Design and implementation of a cipher system (LAM) on a FPGA based on PCI architecture
MINO'07 Proceedings of the 6th conference on Microelectronics, nanoelectronics, optoelectronics
Digital design of a key synchronization system on a FPGA for a network use
MINO'07 Proceedings of the 6th conference on Microelectronics, nanoelectronics, optoelectronics
Key management for cipher system (LAM)
ICCOMP'08 Proceedings of the 12th WSEAS international conference on Computers
Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors
Information Security and Cryptology --- ICISC 2008
POTSHARDS—a secure, recoverable, long-term archival storage system
ACM Transactions on Storage (TOS)
Characterizing Padding Rules of MD Hash Functions Preserving Collision Security
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Challenges in teaching a graduate course in applied cryptography
ACM SIGCSE Bulletin
A lightweight secure protocol for wireless sensor networks
Computer Communications
Secure automatic ticketing system
DNCOCO'09 Proceedings of the 8th WSEAS international conference on Data networks, communications, computers
Affinity of permutations of F2n
Discrete Applied Mathematics - Special issue: Coding and cryptography
Proceedings of the International Conference and Workshop on Emerging Trends in Technology
The Journal of Machine Learning Research
A finite state modeling of AFDX frame management using spin
FMICS'06/PDMC'06 Proceedings of the 11th international workshop, FMICS 2006 and 5th international workshop, PDMC conference on Formal methods: Applications and technology
Location privacy in geospatial decision-making
DNIS'07 Proceedings of the 5th international conference on Databases in networked information systems
Token-based authenticated key establishment protocols for three-party communication
EUC'07 Proceedings of the 2007 conference on Emerging direction in embedded and ubiquitous computing
LISA: lightweight security algorithm for wireless sensor networks
ICDCIT'07 Proceedings of the 4th international conference on Distributed computing and internet technology
Blind evaluation of nearest neighbor queries using space transformation to preserve location privacy
SSTD'07 Proceedings of the 10th international conference on Advances in spatial and temporal databases
The security of EPC Gen2 compliant RFID protocols
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Modified AES using chaotic key generator for satellite imagery encryption
ICIC'09 Proceedings of the 5th international conference on Emerging intelligent computing technology and applications
Hadamard equivalence of binary matrices
APCC'09 Proceedings of the 15th Asia-Pacific conference on Communications
Chaos-based secure satellite imagery cryptosystem
Computers & Mathematics with Applications
Proceedings of the 7th International Conference on Advances in Mobile Computing and Multimedia
A survey of confidential data storage and deletion methods
ACM Computing Surveys (CSUR)
Garden of eden configurations for 2-D cellular automata with rule 2460N
Information Sciences: an International Journal
New fault attacks using Jacobi symbol and application to regular right-to-left algorithms
Information Processing Letters
Structures used in secure automatic ticketing system
WSEAS Transactions on Computers
How to teach undergraduate students a real cipher design
ITHET'10 Proceedings of the 9th international conference on Information technology based higher education and training
Formalism in coding the genetic information
ICAI'10 Proceedings of the 11th WSEAS international conference on Automation & information
Review: Privacy versus scalability in radio frequency identification systems
Computer Communications
Interactive visualization system for DES
AMT'10 Proceedings of the 6th international conference on Active media technology
Introducing cryptography course in computer science undergraduate curricula
Proceedings of the 48th Annual Southeast Regional Conference
A review of the audio and video steganalysis algorithms
Proceedings of the 48th Annual Southeast Regional Conference
Publishing upper half of RSA decryption exponent
IWSEC'10 Proceedings of the 5th international conference on Advances in information and computer security
Efficient authentication for mobile and pervasive computing
ICICS'10 Proceedings of the 12th international conference on Information and communications security
Revisiting the security of the ALRED design
ISC'10 Proceedings of the 13th international conference on Information security
Stronger difficulty notions for client puzzles and denial-of-service-resistant protocols
CT-RSA'11 Proceedings of the 11th international conference on Topics in cryptology: CT-RSA 2011
A novel and efficient cryptosystem for large message encryption
International Journal of Information and Communication Technology
Securing low-cost RFID systems: An unconditionally secure approach
Journal of Computer Security - 2010 Workshop on RFID Security (RFIDSec'10 Asia)
ICITS'11 Proceedings of the 5th international conference on Information theoretic security
On the security of αη: response to 'some attacks on quantum-based cryptographic protocols'
Quantum Information & Computation
Visualizing secure Hash algorithm (SHA-1) on the web
AMT'11 Proceedings of the 7th international conference on Active media technology
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
Provably secure three-party password-based authenticated key exchange protocol
Information Sciences: an International Journal
RC4-hash: a new hash function based on RC4
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and its Applications - Volume Part I
New key management systems for multilevel security
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part II
Towards optimal double-length hash functions
INDOCRYPT'05 Proceedings of the 6th international conference on Cryptology in India
Attacking right-to-left modular exponentiation with timely random faults
FDTC'06 Proceedings of the Third international conference on Fault Diagnosis and Tolerance in Cryptography
Indexing information for data forensics
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
Efficiency and security trade-off in supporting range queries on encrypted databases
DBSec'05 Proceedings of the 19th annual IFIP WG 11.3 working conference on Data and Applications Security
Securing admission control in ubiquitous computing environment
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
An algebraic interpretation of AES-128
AES'04 Proceedings of the 4th international conference on Advanced Encryption Standard
A key pre-distribution scheme for wireless sensor networks: merging blocks in combinatorial design
ISC'05 Proceedings of the 8th international conference on Information Security
Construction of two level orthogonal arrays via solutions of linear systems
CASC'05 Proceedings of the 8th international conference on Computer Algebra in Scientific Computing
A public key cryptosystem based on three new provable problems
Theoretical Computer Science
High diffusion cipher: encryption and error correction in a single cryptographic primitive
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
Efficient remote user authentication and key establishment for multi-server environment
ICDCIT'06 Proceedings of the Third international conference on Distributed Computing and Internet Technology
Efficient CRT-RSA decryption for small encryption exponents
CT-RSA'10 Proceedings of the 2010 international conference on Topics in Cryptology
Node capture games: a game theoretic approach to modeling and mitigating node capture attacks
GameSec'11 Proceedings of the Second international conference on Decision and Game Theory for Security
On the rila-mitchell security protocols for biometrics-based cardholder authentication in smartcards
ICCSA'05 Proceedings of the 2005 international conference on Computational Science and Its Applications - Volume Part IV
A new secret sharing scheme for images based on additive 2-dimensional cellular automata
IbPRIA'05 Proceedings of the Second Iberian conference on Pattern Recognition and Image Analysis - Volume Part I
A hybrid design of key pre-distribution scheme for wireless sensor networks
ICISS'05 Proceedings of the First international conference on Information Systems Security
ACM Transactions on Information and System Security (TISSEC)
Mathematical and Computer Modelling: An International Journal
Prêt à Voter with Paillier encryption
Mathematical and Computer Modelling: An International Journal
Editorial: A decade of Finite Fields and Their Applications
Finite Fields and Their Applications
On the complexity of the herding attack and some related attacks on hash functions
Designs, Codes and Cryptography
Local Shannon entropy measure with statistical tests for image randomness
Information Sciences: an International Journal
On Game-Theoretic Network Security Provisioning
Journal of Network and Systems Management
Secret Sharing Scheme: Vector Space Secret Sharing and F Function
ASONAM '12 Proceedings of the 2012 International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2012)
Secure cloud-assisted location based reminder
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
Vector space secret sharing and an efficient algorithm to construct a φ function
Proceedings of the 51st ACM Southeast Conference
FPGA based unified architecture for public key and private key cryptosystems
Frontiers of Computer Science: Selected Publications from Chinese Universities
Joux multicollisions attack in sponge construction
Proceedings of the 6th International Conference on Security of Information and Networks
A chaotic neural network-based encryption algorithm for MPEG-2 encoded video signal
International Journal of Artificial Intelligence and Soft Computing
Rethinking Stream Ciphers: Can Extracting be Better than Expanding?
Wireless Personal Communications: An International Journal
Design of image cipher using latin squares
Information Sciences: an International Journal
Adaptive Method of Adjusting Flowgraph for Route Reconstruction in Video Surveillance Systems
Fundamenta Informaticae - To Andrzej Skowron on His 70th Birthday
Secure group re-keying using key inverses
Journal of High Speed Networks
Hi-index | 0.00 |
From the Publisher:The Advanced Encryption Standard (AES), elliptic curve DSA, the secure hash algorithm聟these and other major advances over that last five years demanded this comprehensive revision of the standard-setting text and reference, Cryptography: Theory and Practice. Now more tightly focused on the core areas, it contains many new topics as well as thoroughly updated treatments of topics presented in the first edition. There is increased emphasis on general concepts, but the outstanding features that first made this a bestseller all remain, including its mathematical rigor, numerous examples, pseudocode descriptions of algorithms, and clear, precise explanations.New in the Second Edition:· Explains the latest Federal Information Processing Standards , including the Advanced Encryption Standard (AES), the Secure Has Algorithm (SHA-1), and the Elliptic Curve Digital Signature Algorithm (ECDSA)· Uses substitution-permutation networks to introduce block cipher design and analysis concepts· Explains both linear and differential cryptanalysis· Presents the Random Oracle model for hash functions· Addresses semantic security of RSA and Optional Asymmetric Encryption Padding· Discusses Wiener's attach on low decryption exponent RSA Overwhelmingly popular and relied upon in its first edition, now, more than ever, Cryptography: Theory and Practice provides an introduction to the field ideal for upper-level students in both mathematics and computer science.More highlights of the Second Edition:· Provably secure signature schemes: Full Domain Hash· Universal hash families· Expanded treatment of message authentication codes· More discussions on elliptic curves· Lower bounds for thecomplexity of generic algorithms for the discrete logarithm problem· Expanded treatment of factoring algorithms· Security definitions for signature schemes