Xem mẫu

CRYPTOGRAPHY AND SECURITY IN COMPUTING Edited by Jaydip Sen Cryptography and Security in Computing Edited by Jaydip Sen Published by InTech Janeza Trdine 9, 51000 Rijeka, Croatia Copyright © 2012 InTech All chapters are Open Access distributed under the Creative Commons Attribution 3.0 license, which allows users to download, copy and build upon published articles even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. After this work has been published by InTech, authors have the right to republish it, in whole or part, in any publication of which they are the author, and to make other personal use of the work. Any republication, referencing or personal use of the work must explicitly identify the original source. As for readers, this license allows users to download, copy and build upon published chapters even for commercial purposes, as long as the author and publisher are properly credited, which ensures maximum dissemination and a wider impact of our publications. Notice Statements and opinions expressed in the chapters are these of the individual contributors and not necessarily those of the editors or publisher. No responsibility is accepted for the accuracy of information contained in the published chapters. The publisher assumes no responsibility for any damage or injury to persons or property arising out of the use of any materials, instructions, methods or ideas contained in the book. Publishing Process Manager Mirna Cvijic Technical Editor Teodora Smiljanic Cover Designer InTech Design Team First published March, 2012 Printed in Croatia A free online edition of this book is available at www.intechopen.com Additional hard copies can be obtained from orders@intechweb.org Cryptography and Security in Computing, Edited by Jaydip Sen p. cm. 978-953-51-0179-6 Contents Preface IX Part 1 Theoretical and Fundamental Aspects of Cryptography 1 Chapter 1 Provably Secure Cryptographic Constructions 3 Sergey I. Nikolenko Chapter 2 Malicious Cryptology and Mathematics 23 Eric Filiol Chapter 3 Cryptographic Criteria on Vector Boolean Functions 51 José Antonio Álvarez-Cubero and Pedro J. Zufiria Chapter 4 Chapter 5 Construction of Orthogonal Arrays of Index Unity Using Logarithm Tables for Galois Fields 71 Jose Torres-Jimenez, Himer Avila-George, Nelson Rangel-Valdez and Loreto Gonzalez-Hernandez Elliptic Curve Cryptography and Point Counting Algorithms 91 Hailiza Kamarulhaili and Liew Khang Jie Chapter 6 Part 2 Division and Inversion Over Finite Fields 117 Abdulah Abdulah Zadeh Applications of Cryptographic Algorithms and Protocols 131 Chapter 7 Chapter 8 Secure and Privacy-Preserving Data Aggregation Protocols for Wireless Sensor Networks 133 Jaydip Sen Scan-Based Side-Channel Attack on the RSA Cryptosystem 165 Ryuta Nara, Masao Yanagisawa and Nozomu Togawa ... - tailieumienphi.vn
nguon tai.lieu . vn