LEADER 00774nam0-2200265 --450 001 9910502510303321 005 20211021163836.0 010 $a0-500-51131-4 100 $a20211021d2004----kmuy0itay5050 ba 101 0 $aeng 102 $aGB 105 $a 001yy 200 1 $a<>Vanguard Landscapes and Gardens of Martha Schwartz$fedited by Tim Richardson 210 $aLondon$cThames & Hudson$d2004 215 $a223 p.$cill.$d29x29 cm 610 0 $aSchwartz, Martha 676 $a712.092$v19 702 1$aRichardson,$bTim 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910502510303321 952 $aPICONE 245$bPIC 245$fDARPU 959 $aDARPU 996 $aVanguard Landscapes and Gardens of Martha Schwartz$91881359 997 $aUNINA LEADER 04974nam 22008895 450 001 9910483305303321 005 20251226202137.0 010 $a3-540-77272-3 024 7 $a10.1007/978-3-540-77272-9 035 $a(CKB)1000000000490475 035 $a(SSID)ssj0000492665 035 $a(PQKBManifestationID)11929981 035 $a(PQKBTitleCode)TC0000492665 035 $a(PQKBWorkID)10479404 035 $a(PQKB)10428898 035 $a(DE-He213)978-3-540-77272-9 035 $a(MiAaPQ)EBC4976078 035 $a(MiAaPQ)EBC337129 035 $a(Au-PeEL)EBL337129 035 $a(OCoLC)232363528 035 $a(MiAaPQ)EBC6806074 035 $a(Au-PeEL)EBL6806074 035 $a(OCoLC)1164871332 035 $a(PPN)123731739 035 $a(MiAaPQ)EBC5585704 035 $a(EXLCZ)991000000000490475 100 $a20100301d2007 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography and Coding $e11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings /$fedited by Steven Galbraith 205 $a1st ed. 2007. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2007. 215 $a1 online resource (XI, 426 p.) 225 1 $aSecurity and Cryptology,$x2946-1863 ;$v4887 300 $aIncludes index. 311 08$a3-540-77271-5 327 $aInvited Papers -- Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise -- Galois Rings and Pseudo-random Sequences -- Signatures I -- Finding Invalid Signatures in Pairing-Based Batches -- How to Forge a Time-Stamp Which Adobe?s Acrobat Accepts -- Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions -- On the Walsh Spectrum of a New APN Function -- Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes -- Cryptanalysis of the EPBC Authenticated Encryption Mode -- Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption -- Algebraic Cryptanalysis of the Data Encryption Standard -- Cryptographic Side-Channels from Low-Power Cache Memory -- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures -- Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity -- Modified Berlekamp-Massey Algorithm for Approximating the k-Error Linear Complexity of Binary Sequences -- Efficient KEMs with Partial Message Recovery -- Randomness Reuse: Extensions and Improvements -- On the Connection Between Signcryption and One-Pass Key Establishment -- Optimised Versions of the Ate and Twisted Ate Pairings -- Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic -- Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction -- Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic -- Toward Acceleration of RSA Using 3D Graphics Hardware -- Signatures II -- Multi-key Hierarchical Identity-Based Signatures -- Verifier-Key-Flexible Universal Designated-Verifier Signatures. 330 $aThis book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation. 410 0$aSecurity and Cryptology,$x2946-1863 ;$v4887 606 $aCoding theory 606 $aInformation theory 606 $aCryptography 606 $aData encryption (Computer science) 606 $aData protection 606 $aComputer science$xMathematics 606 $aDiscrete mathematics 606 $aComputer networks 606 $aCoding and Information Theory 606 $aCryptology 606 $aData and Information Security 606 $aDiscrete Mathematics in Computer Science 606 $aComputer Communication Networks 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aData protection. 615 0$aComputer science$xMathematics. 615 0$aDiscrete mathematics. 615 0$aComputer networks. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aData and Information Security. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 676 $a003.54 702 $aGalbraith$b Steven D. 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910483305303321 996 $aCryptography and Coding$93655583 997 $aUNINA