Beschreibung
InhaltsangabeModel-Based Conformance Testing for Android.- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography.- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU.- Very Short Critical Path Implementation of AES with Direct Logic Gates.- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary.- Compact Stateful Encryption Schemes with Ciphertext Verifiability.- Structured Encryption for Conceptual Graphs.- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability.- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI.- Boomerang Distinguishers for Full HAS-160 Compression Function.- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function.- Annihilators of Fast Discrete Fourier Spectra Attacks.- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher.- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security.- Efficient Secure Primitive for Privacy Preserving Distributed Computations.- Generic Construction of GUC Secure Commitment in the KRK Model.