LEADER 04917nam 22007215 450 001 996465731003316 005 20200702041002.0 024 7 $a10.1007/11586821 035 $a(CKB)1000000000213526 035 $a(SSID)ssj0000317073 035 $a(PQKBManifestationID)11274465 035 $a(PQKBTitleCode)TC0000317073 035 $a(PQKBWorkID)10287785 035 $a(PQKB)10254162 035 $a(DE-He213)978-3-540-32418-8 035 $a(MiAaPQ)EBC3067771 035 $a(PPN)123098572 035 $a(EXLCZ)991000000000213526 100 $a20100412d2005 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aCryptography and Coding$b[electronic resource] $e10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings /$fedited by Nigel Smart 205 $a1st ed. 2005. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2005. 215 $a1 online resource (XII, 468 p.) 225 1 $aSecurity and Cryptology ;$v3796 300 $aBibliographic Level Mode of Issuance: Monograph 311 08$aPrinted edition: 9783540302766 320 $aIncludes bibliographical references and index. 327 $aInvited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploiting Coding Theory for Collision Attacks on SHA-1 -- Signatures and Signcryption -- Hash Based Digital Signature Schemes -- A General Construction for Simultaneous Signing and Encrypting -- Non-interactive Designated Verifier Proofs and Undeniable Signatures -- Symmetric Cryptography -- Partial Key Recovery Attacks on XCBC, TMAC and OMAC -- Domain Expansion of MACs: Alternative Uses of the FIL-MAC -- Normality of Vectorial Functions -- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 -- Side Channels -- The Physically Observable Security of Signature Schemes -- On the Automatic Construction of Indistinguishable Operations -- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods -- Algebraic Cryptanalysis -- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem -- An Algebraic Framework for Cipher Embeddings -- Probabilistic Algebraic Attacks -- Information Theoretic Applications -- Unconditionally Secure Information Authentication in Presence of Erasures -- Generalized Strong Extractors and Deterministic Privacy Amplification -- On Threshold Self-healing Key Distribution Schemes -- Number Theoretic Foundations -- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator -- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited -- Pairings on Elliptic Curves over Finite Commutative Rings -- Public Key and ID-Based Encryption Schemes -- A Key Encapsulation Mechanism for NTRU -- Efficient Identity-Based Key Encapsulation to Multiple Parties -- Security Proof of Sakai-Kasahara?s Identity-Based Encryption Scheme. 410 0$aSecurity and Cryptology ;$v3796 606 $aData encryption (Computer science) 606 $aComputers 606 $aCoding theory 606 $aInformation theory 606 $aComputer science?Mathematics 606 $aComputer communication systems 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aData encryption (Computer science). 615 0$aComputers. 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aComputer science?Mathematics. 615 0$aComputer communication systems. 615 14$aCryptology. 615 24$aTheory of Computation. 615 24$aCoding and Information Theory. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 676 $a005.82 702 $aSmart$b Nigel$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aIMA International Conference 906 $aBOOK 912 $a996465731003316 996 $aCryptography and Coding$9772174 997 $aUNISA