03862nam 22007815 450 99646537490331620200705184609.03-642-20728-610.1007/978-3-642-20728-0(CKB)2670000000083930(SSID)ssj0000530618(PQKBManifestationID)11332942(PQKBTitleCode)TC0000530618(PQKBWorkID)10567880(PQKB)11595384(DE-He213)978-3-642-20728-0(MiAaPQ)EBC3066711(PPN)153868244(EXLCZ)99267000000008393020110505d2011 u| 0engurnn|008mamaatxtccrInformation Theoretic Security[electronic resource] 5th International Conference, ICITS 2011, Amsterdam, The Netherlands, May 21-24, 2011, Proceedings /edited by Serge Fehr1st ed. 2011.Berlin, Heidelberg :Springer Berlin Heidelberg :Imprint: Springer,2011.1 online resource (X, 227 p.) Security and Cryptology ;6673Bibliographic Level Mode of Issuance: Monograph3-642-20727-8 Includes bibliographical references and index.This book constitutes the refereed proceedings of the 5th International Conference on Information Theoretic Security, held in Amsterdam, The Netherlands, in May 2011. The 12 revised full papers presented together with 7 invited lectures were carefully reviewed and selected from 27 submissions. Understanding the minimal requirements for information-theoretic security is a central part of this line of research. Very attractive is the mathematical neatness of the field, and its rich connections to other areas of mathematics, like probability and information theory, algebra, combinatorics, coding theory, and quantum information processing, just to mention the most prominent ones.Security and Cryptology ;6673Data encryption (Computer science)Computer securityAlgorithmsComputer communication systemsManagement information systemsComputer scienceComputers and civilizationCryptologyhttps://scigraph.springernature.com/ontologies/product-market-codes/I28020Systems and Data Securityhttps://scigraph.springernature.com/ontologies/product-market-codes/I28060Algorithm Analysis and Problem Complexityhttps://scigraph.springernature.com/ontologies/product-market-codes/I16021Computer Communication Networkshttps://scigraph.springernature.com/ontologies/product-market-codes/I13022Management of Computing and Information Systemshttps://scigraph.springernature.com/ontologies/product-market-codes/I24067Computers and Societyhttps://scigraph.springernature.com/ontologies/product-market-codes/I24040Data encryption (Computer science).Computer security.Algorithms.Computer communication systems.Management information systems.Computer science.Computers and civilization.Cryptology.Systems and Data Security.Algorithm Analysis and Problem Complexity.Computer Communication Networks.Management of Computing and Information Systems.Computers and Society.005.8Fehr Sergeedthttp://id.loc.gov/vocabulary/relators/edtICITS 2011BOOK996465374903316Information Theoretic Security773803UNISA04187nam 2200601Ia 450 991048432930332120200520144314.03-642-05445-510.1007/978-3-642-05445-7(CKB)1000000000804452(SSID)ssj0000355614(PQKBManifestationID)11925336(PQKBTitleCode)TC0000355614(PQKBWorkID)10340757(PQKB)10136366(DE-He213)978-3-642-05445-7(MiAaPQ)EBC3064753(PPN)139962522(EXLCZ)99100000000080445220090925d2009 uy 0engurnn|008mamaatxtccrSelected areas in cryptography 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 ; revised selected papers /Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.)1st ed. 2009.New York ;Berlin Springerc20091 online resource (XIII, 467 p.) Lecture notes in computer science ;5867Bibliographic Level Mode of Issuance: Monograph3-642-05443-9 Includes bibliographical references and index.Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function -- Miscellaneous Techniques -- More on Key Wrapping -- Information Theoretically Secure Multi Party Set Intersection Re-visited -- Real Traceable Signatures -- Hash Functions II -- Cryptanalysis of Hash Functions with Structures -- Cryptanalysis of the LANE Hash Function -- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 -- Hardware Implementation and Cryptanalysis -- A More Compact AES -- Optimization Strategies for Hardware-Based Cofactorization -- More on the Security of Linear RFID Authentication Protocols -- Differential Fault Analysis of Rabbit -- An Improved Recovery Algorithm for Decayed AES Key Schedule Images -- Block Ciphers -- Cryptanalysis of the Full MMB Block Cipher -- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis -- Improved Integral Attacks on MISTY1 -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption -- Implementation of Public Key Cryptography -- On Repeated Squarings in Binary Fields -- Highly Regular m-Ary Powering Ladders -- An Efficient Residue Group Multiplication for the ? T Pairing over -- Compact McEliece Keys from Goppa Codes -- Hash Functions and Stream Ciphers -- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård -- Cryptanalysis of Dynamic SHA(2) -- A New Approach for FCSRs -- New Cryptanalysis of Irregularly Decimated Stream Ciphers.This volume constitutes the selected papers of the 16th Annual International Workshop on Selected Areas in Cryptography, SAC 2009, held in Calgary, Alberta, Canada, in August 13-14 2009. From a total of 99 technical papers, 27 papers were accepted for presentation at the workshop. They cover the following topics: hash functions, on block and stream ciphers, public key schemes, implementation, and privacy-enhancing cryptographic systems.Lecture notes in computer science ;5867.CryptographyCongressesData encryption (Computer science)CongressesCryptographyData encryption (Computer science)004n/aDAT 465fstubSS 4800rvkJacobson Michael J472335Rijmen Vincent1970-1726354Safavi-Naini Reihanah1220957MiAaPQMiAaPQMiAaPQBOOK9910484329303321Selected areas in cryptography4198204UNINA