Xem mẫu
CRYPTOGRAPHY AND SECURITY IN COMPUTING
Edited by Jaydip Sen
Cryptography and Security in Computing Edited by Jaydip Sen
Published by InTech
Janeza Trdine 9, 51000 Rijeka, Croatia
Copyright © 2012 InTech
All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which allows users to download, copy and build upon published articles even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source.
As for readers, this license allows users to download, copy and build upon published chapters even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications.
Notice
Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published chapters. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book.
Publishing Process Manager Mirna Cvijic Technical Editor Teodora Smiljanic
Cover Designer InTech Design Team
First published March, 2012 Printed in Croatia
A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org
Cryptography and Security in Computing, Edited by Jaydip Sen p. cm.
978-953-51-0179-6
Contents
Preface IX
Part 1 Theoretical and Fundamental Aspects of Cryptography 1
Chapter 1 Provably Secure Cryptographic Constructions 3 Sergey I. Nikolenko
Chapter 2 Malicious Cryptology and Mathematics 23 Eric Filiol
Chapter 3 Cryptographic Criteria on Vector Boolean Functions 51 José Antonio Álvarez-Cubero and Pedro J. Zufiria
Chapter 4
Chapter 5
Construction of Orthogonal Arrays of
Index Unity Using Logarithm Tables for Galois Fields 71 Jose Torres-Jimenez, Himer Avila-George,
Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez
Elliptic Curve Cryptography and Point Counting Algorithms 91 Hailiza Kamarulhaili and Liew Khang Jie
Chapter 6
Part 2
Division and Inversion Over Finite Fields 117 Abdulah Abdulah Zadeh
Applications of Cryptographic Algorithms and Protocols 131
Chapter 7
Chapter 8
Secure and Privacy-Preserving Data
Aggregation Protocols for Wireless Sensor Networks 133 Jaydip Sen
Scan-Based Side-Channel
Attack on the RSA Cryptosystem 165
Ryuta Nara, Masao Yanagisawa and Nozomu Togawa
...
- tailieumienphi.vn
nguon tai.lieu . vn