Public-Key Cryptography -- PKC 2013

Public-Key Cryptography -- PKC 2013

Author: Kaoru Kurosawa

Publisher: Springer

Published: 2013-02-05

Total Pages: 528

ISBN-13: 3642363628

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2013, held in Nara, Japan, in February/March 2013. The 28 papers presented together with 2 invited talks were carefully reviewed and selected from numerous submissions. The papers are organized in the following topical sections: homomorphic encryption, primitives, functional encryption/signatures, RSA, IBE and IPE, key exchange, signature schemes, encryption, and protocols.


Mathematics of Public Key Cryptography

Mathematics of Public Key Cryptography

Author: Steven D. Galbraith

Publisher: Cambridge University Press

Published: 2012-03-15

Total Pages: 631

ISBN-13: 1107013925

DOWNLOAD EBOOK

This advanced graduate textbook gives an authoritative and insightful description of the major ideas and techniques of public key cryptography.


Public-Key Cryptography -- PKC 2014

Public-Key Cryptography -- PKC 2014

Author: Hugo Krawczyk

Publisher: Springer

Published: 2014-02-20

Total Pages: 699

ISBN-13: 3642546315

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 17th International Conference on Practice and Theory in Public-Key Cryptography, PKC 2014, held in Buenos Aires, Argentina, in March 2014. The 38 papers presented were carefully reviewed and selected from 145 submissions. The papers are organized in topical sections on chosen ciphertext security, re-encryption, verifiable outsourcing, cryptanalysis, identity and attribute-based encryption, enhanced encryption, signature schemes, related-key security, functional authentication, quantum impossibility, privacy, protocols.


Protocols for Authentication and Key Establishment

Protocols for Authentication and Key Establishment

Author: Colin Boyd

Publisher: Springer Nature

Published: 2019-11-06

Total Pages: 542

ISBN-13: 3662581469

DOWNLOAD EBOOK

This book is the most comprehensive and integrated treatment of the protocols required for authentication and key establishment. In a clear, uniform presentation the authors classify most protocols in terms of their properties and resource requirements, and describe all the main attack types, so the reader can quickly evaluate protocols for particular applications. In this edition the authors introduced new chapters and updated the text throughout in response to new developments and updated standards. The first chapter, an introduction to authentication and key establishment, provides the necessary background on cryptography, attack scenarios, and protocol goals. A new chapter, computational security models, describes computational models for key exchange and authentication and will help readers understand what a computational proof provides and how to compare the different computational models in use. In the subsequent chapters the authors explain protocols that use shared key cryptography, authentication and key transport using public key cryptography, key agreement protocols, the Transport Layer Security protocol, identity-based key agreement, password-based protocols, and group key establishment. The book is a suitable graduate-level introduction, and a reference and overview for researchers and practitioners with 225 concrete protocols described. In the appendices the authors list and summarize the relevant standards, linking them to the main book text when appropriate, and they offer a short tutorial on how to build a key establishment protocol. The book also includes a list of protocols, a list of attacks, a summary of the notation used in the book, general and protocol indexes, and an extensive bibliography.


Applied Cryptography and Network Security

Applied Cryptography and Network Security

Author: Giuseppe Ateniese

Publisher: Springer Nature

Published: 2022-06-17

Total Pages: 916

ISBN-13: 3031092341

DOWNLOAD EBOOK

The LNCS volume 13269 constitutes the proceedings of the 20th International Conference on Applied Cryptography and Network Security, ACNS 2022, which will take place in a hybrid mode in Rome, Italy in June 2022. The 44 full papers together with 5 short papers presented in this proceeding were carefully reviewed and selected from a total of 185 submissions. They were organized in topical sections as follows: Encryption, Attacks, Cryptographic Protocols, System Security., Cryptographic Primitives, MPC, Blockchain, Block-Cyphers, and Post-Quantum Cryptography.


Functional Encryption

Functional Encryption

Author: Khairol Amali Bin Ahmad

Publisher: Springer Nature

Published: 2021-06-12

Total Pages: 311

ISBN-13: 3030608905

DOWNLOAD EBOOK

This book provides awareness of methods used for functional encryption in the academic and professional communities. The book covers functional encryption algorithms and its modern applications in developing secure systems via entity authentication, message authentication, software security, cyber security, hardware security, Internet of Thing (IoT), cloud security, smart card technology, CAPTCHA, digital signature, and digital watermarking. This book is organized into fifteen chapters; topics include foundations of functional encryption, impact of group theory in cryptosystems, elliptic curve cryptography, XTR algorithm, pairing based cryptography, NTRU algorithms, ring units, cocks IBE schemes, Boneh-Franklin IBE, Sakai-Kasahara IBE, hierarchical identity based encryption, attribute based Encryption, extensions of IBE and related primitives, and digital signatures. Explains the latest functional encryption algorithms in a simple way with examples; Includes applications of functional encryption in information security, application security, and network security; Relevant to academics, research scholars, software developers, etc.


Applied Cryptography and Network Security

Applied Cryptography and Network Security

Author: Tal Malkin

Publisher: Springer

Published: 2016-01-09

Total Pages: 697

ISBN-13: 3319281666

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 13th International Conference on Applied Cryptography and Network Security, ACNS 2015, held in New York, NY, USA, in June 2015. The 33 revised full papers included in this volume and presented together with 2 abstracts of invited talks, were carefully reviewed and selected from 157 submissions. They are organized in topical sections on secure computation: primitives and new models; public key cryptographic primitives; secure computation II: applications; anonymity and related applications; cryptanalysis and attacks (symmetric crypto); privacy and policy enforcement; authentication via eye tracking and proofs of proximity; malware analysis and side channel attacks; side channel countermeasures and tamper resistance/PUFs; and leakage resilience and pseudorandomness.


Homomorphic Signature Schemes

Homomorphic Signature Schemes

Author: Giulia Traverso

Publisher: Springer

Published: 2016-04-21

Total Pages: 73

ISBN-13: 3319321153

DOWNLOAD EBOOK

Homomorphic signature schemes are an important primitive for many applications and since their introduction numerous solutions have been presented. Thus, in this work we provide the first exhaustive, complete, and up-to-date survey about the state of the art of homomorphic signature schemes. First, the general framework where homomorphic signatures are defined is described and it is shown how the currently available types of homomorphic signatures can then be derived from such a framework. In addition, this work also presents a description of each of the schemes presented so far together with the properties it provides. Furthermore, three use cases, electronic voting, smart grids, and electronic health records, where homomorphic signature schemes can be employed are described. For each of these applications the requirements that a homomorphic signature scheme should fulfill are defined and the suitable schemes already available are listed. This also highlights the shortcomings of current solutions. Thus, this work concludes with several ideas for future research in the direction of homomorphic signature schemes.