top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology - ASIACRYPT 2010 [[electronic resource] ] : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings / / edited by Masayuki Abe
Advances in Cryptology - ASIACRYPT 2010 [[electronic resource] ] : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010. Proceedings / / edited by Masayuki Abe
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIV, 634 p. 70 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Management information systems
Computer science
Computer science—Mathematics
Computer security
Applied mathematics
Engineering mathematics
Cryptology
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Discrete Mathematics in Computer Science
Systems and Data Security
Applications of Mathematics
ISBN 1-280-39053-0
9786613568458
3-642-17373-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Attacks -- Rotational Rebound Attacks on Reduced Skein -- Finding Second Preimages of Short Messages for Hamsi-256 -- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl -- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems -- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- The World Is Not Enough: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems -- A Byte-Based Guess and Determine Attack on SOSEMANUK -- Improved Single-Key Attacks on 8-Round AES-192 and AES-256 -- Protocols -- Constant-Size Commitments to Polynomials and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model -- Key Exchange -- Generic Compilers for Authenticated Key Exchange -- A Forward-Secure Symmetric-Key Derivation Protocol -- Foundation -- Efficient String-Commitment from Weak Bit-Commitment -- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields -- Random Oracles with(out) Programmability -- Zero-Knowledge -- Short Pairing-Based Non-interactive Zero-Knowledge Arguments -- Short Non-interactive Zero-Knowledge Proofs -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption -- A Group Signature Scheme from Lattice Assumptions -- Lattice-Based Blind Signatures -- Secure Communication and Computation -- The Round Complexity of Verifiable Secret Sharing: The Statistical Case -- General Perfectly Secure Message Transmission Using Linear Codes -- On Invertible Sampling and Adaptive Security -- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition -- Models, Notions, and Assumptions -- A Closer Look at Anonymity and Robustness in Encryption Schemes -- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures -- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography -- Public-Key Encryption -- The Degree of Regularity of HFE Systems -- Structured Encryption and Controlled Disclosure -- Leakage Resilient ElGamal Encryption -- Efficient Public-Key Cryptography in the Presence of Key Leakage.
Record Nr. UNISA-996465949903316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology--ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings / / Masayuki Abe (ed.)
Advances in cryptology--ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings / / Masayuki Abe (ed.)
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, : Springer, 2010
Descrizione fisica 1 online resource (XIV, 634 p. 70 illus.)
Disciplina 005.82
Altri autori (Persone) AbeMasayuki
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Cryptography
ISBN 1-280-39053-0
9786613568458
3-642-17373-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Attacks -- Rotational Rebound Attacks on Reduced Skein -- Finding Second Preimages of Short Messages for Hamsi-256 -- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grøstl -- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2 -- Collision Attacks against the Knudsen-Preneel Compression Functions -- Symmetric-Key Cryptosystems -- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions -- The World Is Not Enough: Another Look on Second-Order DPA -- Block and Stream Ciphers -- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems -- A Byte-Based Guess and Determine Attack on SOSEMANUK -- Improved Single-Key Attacks on 8-Round AES-192 and AES-256 -- Protocols -- Constant-Size Commitments to Polynomials and Their Applications -- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries -- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model -- Key Exchange -- Generic Compilers for Authenticated Key Exchange -- A Forward-Secure Symmetric-Key Derivation Protocol -- Foundation -- Efficient String-Commitment from Weak Bit-Commitment -- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields -- Random Oracles with(out) Programmability -- Zero-Knowledge -- Short Pairing-Based Non-interactive Zero-Knowledge Arguments -- Short Non-interactive Zero-Knowledge Proofs -- Optimistic Concurrent Zero Knowledge -- Lattice-Based Cryptography -- Faster Fully Homomorphic Encryption -- A Group Signature Scheme from Lattice Assumptions -- Lattice-Based Blind Signatures -- Secure Communication and Computation -- The Round Complexity of Verifiable Secret Sharing: The Statistical Case -- General Perfectly Secure Message Transmission Using Linear Codes -- On Invertible Sampling and Adaptive Security -- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition -- Models, Notions, and Assumptions -- A Closer Look at Anonymity and Robustness in Encryption Schemes -- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures -- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography -- Public-Key Encryption -- The Degree of Regularity of HFE Systems -- Structured Encryption and Controlled Disclosure -- Leakage Resilient ElGamal Encryption -- Efficient Public-Key Cryptography in the Presence of Key Leakage.
Altri titoli varianti ASIACRYPT 2010
Record Nr. UNINA-9910484643303321
Berlin, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security
Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security
Autore Abe Masayuki
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2008
Descrizione fisica 1 online resource (399 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Proceedings of the 2008 Association for Computing Machinery Symposium on Information, Computer and Communications Security
Asia CCS '08
ACM Symposium on Information, Computer and Communications Security, Tokyo, Japan - March 19 - 20, 2008
Record Nr. UNINA-9910376407803321
Abe Masayuki  
[Place of publication not identified], : ACM, 2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Topics in cryptology : CT-RSA 2007 : the Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007 : proceedings / / Masayuki Abe (ed.)
Topics in cryptology : CT-RSA 2007 : the Cryptographers' Track at the RSA Conference 2007, San Francisco, CA, USA, February 5-9, 2007 : proceedings / / Masayuki Abe (ed.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2006
Descrizione fisica 1 online resource (XI, 403 p.)
Disciplina 005.8
Altri autori (Persone) AbeMasayuki
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Cryptography
ISBN 3-540-69328-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric-Key Encryption -- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers -- A Simple Related-Key Attack on the Full SHACAL-1 -- Signatures and Authentication -- Impossibility Proofs for RSA Signatures in the Standard Model -- Selecting Secure Passwords -- Human Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function -- Second Preimages for SMASH -- Digital Signatures (I) -- A Practical Optimal Padding for Signature Schemes -- Directed Transitive Signature Scheme -- Identity-Based Multi-signatures from RSA -- Cryptographic Protocols (I) -- Improved Efficiency for Private Stable Matching -- Compact E-Cash from Bounded Accumulator -- Batch Processing of Interactive Proofs -- Side-Channel Attacks (I) -- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls -- Predicting Secret Keys Via Branch Prediction -- Side-Channel Attacks (II) -- Template Attacks on Masking—Resistance Is Futile -- Differential Power Analysis of Stream Ciphers -- Cache Based Remote Timing Attack on the AES -- Cryptographic Protocols (II) -- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement -- Efficient Password-Authenticated Key Exchange Based on RSA -- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels -- Digital Signatures (II) -- A Practical and Tightly Secure Signature Scheme Without Hash Function -- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature -- Efficient Implementation -- Public Key Cryptography and RFID Tags -- A Bit-Slice Implementation of the Whirlpool Hash Function.
Altri titoli varianti CT-RSA 2007
Cryptographers' Track at the RSA Conference
RSA Conference 2007
Record Nr. UNINA-9910484786403321
Berlin ; ; New York, : Springer, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XI, 403 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Computer security
Management information systems
Computer science
Algorithms
Computer communication systems
Cryptology
Discrete Mathematics in Computer Science
Systems and Data Security
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-69328-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric-Key Encryption -- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers -- A Simple Related-Key Attack on the Full SHACAL-1 -- Signatures and Authentication -- Impossibility Proofs for RSA Signatures in the Standard Model -- Selecting Secure Passwords -- Human Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function -- Second Preimages for SMASH -- Digital Signatures (I) -- A Practical Optimal Padding for Signature Schemes -- Directed Transitive Signature Scheme -- Identity-Based Multi-signatures from RSA -- Cryptographic Protocols (I) -- Improved Efficiency for Private Stable Matching -- Compact E-Cash from Bounded Accumulator -- Batch Processing of Interactive Proofs -- Side-Channel Attacks (I) -- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls -- Predicting Secret Keys Via Branch Prediction -- Side-Channel Attacks (II) -- Template Attacks on Masking—Resistance Is Futile -- Differential Power Analysis of Stream Ciphers -- Cache Based Remote Timing Attack on the AES -- Cryptographic Protocols (II) -- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement -- Efficient Password-Authenticated Key Exchange Based on RSA -- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels -- Digital Signatures (II) -- A Practical and Tightly Secure Signature Scheme Without Hash Function -- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature -- Efficient Implementation -- Public Key Cryptography and RFID Tags -- A Bit-Slice Implementation of the Whirlpool Hash Function.
Record Nr. UNISA-996466161003316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui