LEADER 06108nam 22008415 450 001 996465949903316 005 20200706013218.0 010 $a1-280-39053-0 010 $a9786613568458 010 $a3-642-17373-X 024 7 $a10.1007/978-3-642-17373-8 035 $a(CKB)2670000000064703 035 $a(SSID)ssj0000475829 035 $a(PQKBManifestationID)11337489 035 $a(PQKBTitleCode)TC0000475829 035 $a(PQKBWorkID)10469883 035 $a(PQKB)10283625 035 $a(DE-He213)978-3-642-17373-8 035 $a(MiAaPQ)EBC3066196 035 $a(PPN)149893671 035 $a(EXLCZ)992670000000064703 100 $a20101202d2010 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology - ASIACRYPT 2010$b[electronic resource] $e16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings /$fedited by Masayuki Abe 205 $a1st ed. 2010. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2010. 215 $a1 online resource (XIV, 634 p. 70 illus.) 225 1 $aSecurity and Cryptology ;$v6477 300 $a"International Association for Cryptologic Research". 311 $a3-642-17372-1 320 $aIncludes bibliographical references and index. 327 $aHash Attacks -- Rotational Rebound Attacks on Reduced Skein -- Finding Second Preimages of Short Messages for Hamsi-256 -- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl -- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems -- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- The World Is Not Enough: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems -- A Byte-Based Guess and Determine Attack on SOSEMANUK -- Improved Single-Key Attacks on 8-Round AES-192 and AES-256 -- Protocols -- Constant-Size Commitments to Polynomials and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model -- Key Exchange -- Generic Compilers for Authenticated Key Exchange -- A Forward-Secure Symmetric-Key Derivation Protocol -- Foundation -- Efficient String-Commitment from Weak Bit-Commitment -- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields -- Random Oracles with(out) Programmability -- Zero-Knowledge -- Short Pairing-Based Non-interactive Zero-Knowledge Arguments -- Short Non-interactive Zero-Knowledge Proofs -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption -- A Group Signature Scheme from Lattice Assumptions -- Lattice-Based Blind Signatures -- Secure Communication and Computation -- The Round Complexity of Verifiable Secret Sharing: The Statistical Case -- General Perfectly Secure Message Transmission Using Linear Codes -- On Invertible Sampling and Adaptive Security -- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition -- Models, Notions, and Assumptions -- A Closer Look at Anonymity and Robustness in Encryption Schemes -- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures -- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography -- Public-Key Encryption -- The Degree of Regularity of HFE Systems -- Structured Encryption and Controlled Disclosure -- Leakage Resilient ElGamal Encryption -- Efficient Public-Key Cryptography in the Presence of Key Leakage. 410 0$aSecurity and Cryptology ;$v6477 606 $aData encryption (Computer science) 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputer science?Mathematics 606 $aComputer security 606 $aApplied mathematics 606 $aEngineering mathematics 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aApplications of Mathematics$3https://scigraph.springernature.com/ontologies/product-market-codes/M13003 615 0$aData encryption (Computer science). 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer science?Mathematics. 615 0$aComputer security. 615 0$aApplied mathematics. 615 0$aEngineering mathematics. 615 14$aCryptology. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aSystems and Data Security. 615 24$aApplications of Mathematics. 676 $a005.82 702 $aAbe$b Masayuki$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 02$aInternational Association for Cryptologic Research. 712 12$aInternational Conference on the Theory and Application of Cryptology and Information Security 906 $aBOOK 912 $a996465949903316 996 $aAdvances in Cryptology - ASIACRYPT 2010$92830408 997 $aUNISA