Applied Cryptography and Network Security [[electronic resource] ] : 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings / / edited by Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIII, 535 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Application software Coding theory Information theory Data structures (Computer science) Cryptology Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Coding and Information Theory Data Structures and Information Theory |
ISBN | 3-642-01957-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key Exchange -- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Secure Computation -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- Public-Key Encryption -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Network Security I -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks -- Traitor Tracing -- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -- Tracing and Revoking Pirate Rebroadcasts -- Authentication and Anonymity -- Efficient Deniable Authentication for Signatures -- Homomorphic MACs: MAC-Based Integrity for Network Coding -- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis of CubeHash -- Collision Attack on Boole -- Network Security II -- Integrity Protection for Revision Control -- Fragility of the Robust Security Network: 802.11 Denial of Service -- Fast Packet Classification Using Condition Factorization -- Lattices -- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches -- Broadcast Attacks against Lattice-Based Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Side-Channel Attacks -- How to Compare Profiled Side-Channel Attacks? -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Attacking ECDSA-Enabled RFID Devices. |
Record Nr. | UNISA-996465979303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied cryptography and network security : 7th international conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009 : proceedings / / Michel Abdalla ... [et al.] (eds.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2009 |
Descrizione fisica | 1 online resource (XIII, 535 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | AbdallaMichel |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) Telecommunication - Security measures |
ISBN | 3-642-01957-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key Exchange -- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Secure Computation -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- Public-Key Encryption -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Network Security I -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks -- Traitor Tracing -- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -- Tracing and Revoking Pirate Rebroadcasts -- Authentication and Anonymity -- Efficient Deniable Authentication for Signatures -- Homomorphic MACs: MAC-Based Integrity for Network Coding -- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis of CubeHash -- Collision Attack on Boole -- Network Security II -- Integrity Protection for Revision Control -- Fragility of the Robust Security Network: 802.11 Denial of Service -- Fast Packet Classification Using Condition Factorization -- Lattices -- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches -- Broadcast Attacks against Lattice-Based Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Side-Channel Attacks -- How to Compare Profiled Side-Channel Attacks? -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Attacking ECDSA-Enabled RFID Devices. |
Altri titoli varianti | ACNS 2009 |
Record Nr. | UNINA-9910484102303321 |
Berlin ; ; New York, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and Network Security [[electronic resource] ] : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings / / edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVIII, 349 p. 52 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Coding theory Information theory Cryptology Systems and Data Security Computer Communication Networks Coding and Information Theory |
ISBN | 3-319-02937-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. . |
Record Nr. | UNISA-996465771103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security : 12th International Conference, CANS 2013, Paraty, Brazil, November 20-22, 2013, Proceedings / / edited by Michel Abdalla, Cristina Nita-Rotaru, Ricardo Dahab |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVIII, 349 p. 52 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Coding theory Information theory Cryptology Systems and Data Security Computer Communication Networks Coding and Information Theory |
ISBN | 3-319-02937-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- Zero-Knowledge Protocols -- Distributed Protocols -- Network Security and Applications -- Advanced Cryptographic Primitives -- Verifiable Computation. . |
Record Nr. | UNINA-9910484140403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Pairing-Based Cryptography -- Pairing 2012 [[electronic resource] ] : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 333 p. 18 illus.) |
Disciplina | 005.8/2 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Algorithms Cryptology Systems and Data Security Coding and Information Theory Algorithm Analysis and Problem Complexity |
Soggetto genere / forma | Conference proceedings. |
ISBN | 3-642-36334-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996466247403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Pairing-Based Cryptography -- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 |
Descrizione fisica | 1 online resource (XVI, 333 p. 18 illus.) |
Disciplina | 005.8/2 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Coding theory Information theory Algorithms Cryptology Systems and Data Security Coding and Information Theory Algorithm Analysis and Problem Complexity |
Soggetto genere / forma | Conference proceedings. |
ISBN | 3-642-36334-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910739479603321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Cryptology - LATINCRYPT 2010 [[electronic resource] ] : First International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010, Proceedings / / edited by Michel Abdalla, Paulo S.L.M. Barreto |
Edizione | [1st ed. 2010.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 |
Descrizione fisica | 1 online resource (XII, 323 p. 47 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Cryptology |
ISBN | 3-642-14712-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Broadcast Encryption with Multiple Trust Authorities -- Security of Sequential Multiple Encryption -- Mediated Traceable Anonymous Encryption -- Elliptic Curves -- Starfish on Strike -- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves -- Implementation of Pairings -- Fixed Argument Pairings -- New Software Speed Records for Cryptographic Pairings -- Implementation of Cryptographic Algorithms -- Accelerating Lattice Reduction with FPGAs -- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols and Foundations -- Communication Optimal Multi-valued Asynchronous Broadcast Protocol -- On the Impossibility of Batch Update for Cryptographic Accumulators -- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 -- Generic Attacks on Misty Schemes -- Post-Quantum Cryptography -- Cryptanalysis of the Hidden Matrix Cryptosystem -- A Lattice-Based Threshold Ring Signature Scheme -- Side-Channel Attacks -- Defeating Any Secret Cryptography with SCARE Attacks -- How Leaky Is an Extractor? -- Combined Implementation Attack Resistant Exponentiation. |
Record Nr. | UNISA-996466215603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in cryptology-- LATINCRYPT 2010 : first International Conference on Cryptology and Information Security in Latin America, Puebla, Mexico, August 8-11, 2010 : proceedings / / Michel Abdalla, Paulo S.L.M. Barreto, (eds.) |
Edizione | [1st ed.] |
Pubbl/distr/stampa | Berlin, : Springer, 2010 |
Descrizione fisica | 1 online resource (XII, 323 p. 47 illus.) |
Disciplina | 005.8 |
Altri autori (Persone) |
AbdallaMichel
BarretoPaulo S. L. M |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Cryptography - Latin America
Data encryption (Computer science) |
ISBN | 3-642-14712-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Broadcast Encryption with Multiple Trust Authorities -- Security of Sequential Multiple Encryption -- Mediated Traceable Anonymous Encryption -- Elliptic Curves -- Starfish on Strike -- Estimating the Size of the Image of Deterministic Hash Functions to Elliptic Curves -- Implementation of Pairings -- Fixed Argument Pairings -- New Software Speed Records for Cryptographic Pairings -- Implementation of Cryptographic Algorithms -- Accelerating Lattice Reduction with FPGAs -- Efficient Software Implementation of Binary Field Arithmetic Using Vector Instruction Sets -- Cryptographic Protocols and Foundations -- Communication Optimal Multi-valued Asynchronous Broadcast Protocol -- On the Impossibility of Batch Update for Cryptographic Accumulators -- On the Round Complexity of Zero-Knowledge Proofs Based on One-Way Permutations -- Cryptanalysis of Symmetric Primitives -- Message Recovery and Pseudo-preimage Attacks on the Compression Function of Hamsi-256 -- Generic Attacks on Misty Schemes -- Post-Quantum Cryptography -- Cryptanalysis of the Hidden Matrix Cryptosystem -- A Lattice-Based Threshold Ring Signature Scheme -- Side-Channel Attacks -- Defeating Any Secret Cryptography with SCARE Attacks -- How Leaky Is an Extractor? -- Combined Implementation Attack Resistant Exponentiation. |
Record Nr. | UNINA-9910483053503321 |
Berlin, : Springer, 2010 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public-Key Cryptography – PKC 2018 [[electronic resource] ] : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part I / / edited by Michel Abdalla, Ricardo Dahab |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIX, 714 p. 164 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Computer organization Computers Cryptology Software Engineering/Programming and Operating Systems Computer Systems Organization and Communication Networks Computing Milieux |
ISBN | 3-319-76578-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key-Dependent-Message and Selective-Opening Security -- Searchable and Fully Homomorphic Encryption -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis -- Composable Security -- Oblivious Transfer -- Multiparty Computation -- Signatures -- Structure-Preserving Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions -- Protocols -- Blockchain -- Zero-Knowledge -- Lattices. |
Record Nr. | UNISA-996465516503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Public-Key Cryptography – PKC 2018 [[electronic resource] ] : 21st IACR International Conference on Practice and Theory of Public-Key Cryptography, Rio de Janeiro, Brazil, March 25-29, 2018, Proceedings, Part II / / edited by Michel Abdalla, Ricardo Dahab |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XIX, 760 p. 95 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Computer organization Computers Cryptology Software Engineering/Programming and Operating Systems Computer Systems Organization and Communication Networks Computing Milieux |
ISBN | 3-319-76581-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key-Dependent-Message and Selective-Opening Security -- Searchable and Fully Homomorphic Encryption -- Public-Key Encryption -- Encryption with Bad Randomness -- Subversion Resistance -- Cryptanalysis -- Composable Security -- Oblivious Transfer -- Multiparty Computation -- Signatures -- Structure-Preserving Signatures -- Functional Encryption -- Foundations -- Obfuscation-Based Cryptographic Constructions -- Protocols -- Blockchain -- Zero-Knowledge -- Lattices. |
Record Nr. | UNISA-996465772103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|