top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology – EUROCRYPT 2016 [[electronic resource] ] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I / / edited by Marc Fischlin, Jean-Sébastien Coron
Advances in Cryptology – EUROCRYPT 2016 [[electronic resource] ] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I / / edited by Marc Fischlin, Jean-Sébastien Coron
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXVIII, 853 p. 155 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Management information systems
Computer science
Computer science—Mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
ISBN 3-662-49890-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto (Pseudo)randomness -- LPN/LWE -- Cryptanalysis -- Masking -- Fully homomorphic encryption -- Number theory -- Hash functions -- Multilinear maps -- Message authentification codes -- Attacks on SSL/TLS -- Real-world protocols -- Robust designs -- Lattice reduction.
Record Nr. UNISA-996465707303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2016 [[electronic resource] ] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I / / edited by Marc Fischlin, Jean-Sébastien Coron
Advances in Cryptology – EUROCRYPT 2016 [[electronic resource] ] : 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vienna, Austria, May 8-12, 2016, Proceedings, Part I / / edited by Marc Fischlin, Jean-Sébastien Coron
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXVIII, 853 p. 155 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer security
Management information systems
Computer science
Computer science—Mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Systems and Data Security
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
ISBN 3-662-49890-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto (Pseudo)randomness -- LPN/LWE -- Cryptanalysis -- Masking -- Fully homomorphic encryption -- Number theory -- Hash functions -- Multilinear maps -- Message authentification codes -- Attacks on SSL/TLS -- Real-world protocols -- Robust designs -- Lattice reduction.
Record Nr. UNINA-9910483265203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2017 [[electronic resource] ] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Advances in Cryptology – EUROCRYPT 2017 [[electronic resource] ] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 641 p. 54 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Software engineering
Computer science—Mathematics
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Software Engineering
Discrete Mathematics in Computer Science
ISBN 3-319-56617-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange.
Record Nr. UNISA-996466203503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2017 [[electronic resource] ] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Advances in Cryptology – EUROCRYPT 2017 [[electronic resource] ] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 677 p. 66 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Software engineering
Computer science—Mathematics
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Software Engineering
Discrete Mathematics in Computer Science
ISBN 3-319-56614-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange.
Record Nr. UNISA-996466203903316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2017 [[electronic resource] ] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Advances in Cryptology – EUROCRYPT 2017 [[electronic resource] ] : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXIII, 709 p. 76 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Software engineering
Computer science—Mathematics
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Software Engineering
Discrete Mathematics in Computer Science
ISBN 3-319-56620-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange.
Record Nr. UNISA-996466208103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part III / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 641 p. 54 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Software engineering
Computer science—Mathematics
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Software Engineering
Discrete Mathematics in Computer Science
ISBN 3-319-56617-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange.
Record Nr. UNINA-9910484861703321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part I / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXIII, 709 p. 76 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Software engineering
Computer science—Mathematics
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Software Engineering
Discrete Mathematics in Computer Science
ISBN 3-319-56620-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange.
Record Nr. UNINA-9910484861503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Advances in Cryptology – EUROCRYPT 2017 : 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Paris, France, April 30 – May 4, 2017, Proceedings, Part II / / edited by Jean-Sébastien Coron, Jesper Buus Nielsen
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XXI, 677 p. 66 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Management information systems
Computer science
Software engineering
Computer science—Mathematics
Cryptology
Systems and Data Security
Management of Computing and Information Systems
Software Engineering
Discrete Mathematics in Computer Science
ISBN 3-319-56614-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice attacks and constructions -- Obfuscation and functional encryption -- Discrete logarithm -- Multiparty computation -- Universal composability -- Zero knowledge -- Side-channel attacks and countermeasures -- Functional encryption -- Elliptic curves -- Symmetric cryptanalysis -- Provable security for symmetric cryptography -- security models:- Blockchain -- Memory hard functions -- Symmetric-key constructions -- Obfuscation -- Quantum cryptography -- Public-key encryption and key-exchange.
Record Nr. UNINA-9910483649003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology — ASIACRYPT 2001 [[electronic resource] ] : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Advances in Cryptology — ASIACRYPT 2001 [[electronic resource] ] : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XI, 601 p. 22 illus.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-45682-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice Based Cryptography -- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 -- On the Insecurity of a Server-Aided RSA Protocol -- The Modular Inversion Hidden Number Problem -- Human Identification -- Secure Human Identification Protocols -- Invited Talk -- Unbelievable Security Matching AES Security Using Public Key Systems -- Practical Public Key Cryptography -- A Probable Prime Test with Very High Confidence for n ? 1 mod 4 -- Computation of Discrete Logarithms in -- Speeding Up XTR -- An Efficient Implementation of Braid Groups -- Cryptography Based on Coding Theory -- How to Achieve a McEliece-Based Digital Signature Scheme -- Efficient Traitor Tracing Algorithms Using List Decoding -- Block Ciphers -- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis -- Known-IV Attacks on Triple Modes of Operation of Block Ciphers -- Generic Attacks on Feistel Schemes -- A Compact Rijndael Hardware Architecture with S-Box Optimization -- Provable Security -- Provable Security of KASUMI and 3GPP Encryption Mode f8 -- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices -- Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case -- Threshold Cryptography -- Fully Distributed Threshold RSA under Standard Assumptions -- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes -- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks -- Two-Party Protocols -- Oblivious Polynomial Evaluation and Oblivious Neural Learning -- Mutually Independent Commitments -- Zero Knowledge -- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank -- Responsive Round Complexity and Concurrent Zero-Knowledge -- Cryptographic Building Blocks -- Practical Construction and Analysis of Pseudo-Randomness Primitives -- Autocorrelation Coefficients and Correlation Immunity of Boolean Functions -- Elliptic Curve Cryptography -- An Extension of Kedlaya’s Point-Counting Algorithm to Superelliptic Curves -- Supersingular Curves in Cryptography -- Short Signatures from the Weil Pairing -- Self-Blindable Credential Certificates from the Weil Pairing -- Anonymity -- How to Leak a Secret -- Key-Privacy in Public-Key Encryption -- Provably Secure air Blind Signatures with Tight Revocation.
Record Nr. UNISA-996465322403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XI, 601 p. 22 illus.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-45682-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice Based Cryptography -- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 -- On the Insecurity of a Server-Aided RSA Protocol -- The Modular Inversion Hidden Number Problem -- Human Identification -- Secure Human Identification Protocols -- Invited Talk -- Unbelievable Security Matching AES Security Using Public Key Systems -- Practical Public Key Cryptography -- A Probable Prime Test with Very High Confidence for n ? 1 mod 4 -- Computation of Discrete Logarithms in -- Speeding Up XTR -- An Efficient Implementation of Braid Groups -- Cryptography Based on Coding Theory -- How to Achieve a McEliece-Based Digital Signature Scheme -- Efficient Traitor Tracing Algorithms Using List Decoding -- Block Ciphers -- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis -- Known-IV Attacks on Triple Modes of Operation of Block Ciphers -- Generic Attacks on Feistel Schemes -- A Compact Rijndael Hardware Architecture with S-Box Optimization -- Provable Security -- Provable Security of KASUMI and 3GPP Encryption Mode f8 -- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices -- Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case -- Threshold Cryptography -- Fully Distributed Threshold RSA under Standard Assumptions -- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes -- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks -- Two-Party Protocols -- Oblivious Polynomial Evaluation and Oblivious Neural Learning -- Mutually Independent Commitments -- Zero Knowledge -- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank -- Responsive Round Complexity and Concurrent Zero-Knowledge -- Cryptographic Building Blocks -- Practical Construction and Analysis of Pseudo-Randomness Primitives -- Autocorrelation Coefficients and Correlation Immunity of Boolean Functions -- Elliptic Curve Cryptography -- An Extension of Kedlaya’s Point-Counting Algorithm to Superelliptic Curves -- Supersingular Curves in Cryptography -- Short Signatures from the Weil Pairing -- Self-Blindable Credential Certificates from the Weil Pairing -- Anonymity -- How to Leak a Secret -- Key-Privacy in Public-Key Encryption -- Provably Secure air Blind Signatures with Tight Revocation.
Record Nr. UNINA-9910143920203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui

Data di pubblicazione

Altro...