Most searched books

Archives

Applied Cryptography and Network Security: 5th International by Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan

By Qiong Huang, Duncan S. Wong, Yiming Zhao (auth.), Jonathan Katz, Moti Yung (eds.)

This booklet constitutes the refereed complaints of the fifth overseas convention on utilized Cryptography and community protection, ACNS 2007, held in Zhuhai, China, in June 2007.

The 31 revised complete papers offered have been conscientiously reviewed and chosen from round 260 submissions. The papers are geared up in topical sections on signature schemes, computing device and community protection, cryptanalysis, group-oriented defense, cryptographic protocols, nameless authentication, identity-based cryptography, protection in instant, ad-hoc, and peer-to-peer networks, in addition to effective implementation.

Show description

Read or Download Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings PDF

Similar networking books

Active Directory Cookbook (3rd Edition)

If you want functional hands-on aid for lively listing, the up to date variation of this Cookbook offers quickly suggestions to greater than three hundred difficulties it's possible you'll come upon whilst deploying, administering, and automating Microsoft's community listing provider. You'll locate recipes for the light-weight listing entry Protocol (LDAP), ADAM, multi-master replication, area identify process (DNS), crew coverage, the energetic listing Schema, and lots of different gains.

Extra resources for Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007. Proceedings

Sample text

If large scale quantum computers are built, all popular digital signature schemes like RSA, DSA and ECDSA will become insecure [12]. In addition, significant progresses have been made for solving the underlying number theoretic problems for RSA or DSA, and therefore, the key lengths required to provide sufficient security have been steadily increasing [10]. As a consequence, it is urgent to look for alternative signature schemes, thoroughly analyze and understand their security, and see how they behave in real-life applications.

Digital signature standard (DSS). FIPS PUB 186-2, 2007. gov/publications/fips/. 7. Luis Carlos Coronado Garc´ıa. On the security and the efficiency of the Merkle signature scheme. Cryptology ePrint Archive, Report 2005/192, 2005. org/. 8. Markus Jakobsson, Tom Leighton, Silvio Micali, and Michael Szydlo. Fractal Merkle tree representation and traversal. In Proc. Cryptographer’s Track at RSA Conference (CT-RSA’03), volume 2612 of Lecture Notes in Computer Science, pages 314–326. Springer-Verlag, 2003.

N. 203-209, 1987. 16. H. Krawczyk and T. 143-154, 2000. 17. K. Kurosawa and K. 330-346, Springer-Verlag, 2006. 18. K. R. 255-293, Springer-Verlag, 2001. 19. V. 417-426, Springer-Verlag, 1986. 20. D. Pointcheval and J. 361-396, Springer-Verlag, 2000. 21. C. P. 239-252, Springer-Verlag, 1991. 22. A. Shamir and Y. 355-367, Springer-Verlag, 2001. com Abstract. We propose GMSS, a new variant of the Merkle signature scheme. GMSS is the first Merkle-type signature scheme that allows a cryptographically unlimited (280 ) number of documents to be signed with one key pair.

Download PDF sample

Rated 4.18 of 5 – based on 12 votes

Comments are closed.