top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology — ASIACRYPT 2001 [[electronic resource] ] : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Advances in Cryptology — ASIACRYPT 2001 [[electronic resource] ] : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XI, 601 p. 22 illus.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-45682-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice Based Cryptography -- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 -- On the Insecurity of a Server-Aided RSA Protocol -- The Modular Inversion Hidden Number Problem -- Human Identification -- Secure Human Identification Protocols -- Invited Talk -- Unbelievable Security Matching AES Security Using Public Key Systems -- Practical Public Key Cryptography -- A Probable Prime Test with Very High Confidence for n ? 1 mod 4 -- Computation of Discrete Logarithms in -- Speeding Up XTR -- An Efficient Implementation of Braid Groups -- Cryptography Based on Coding Theory -- How to Achieve a McEliece-Based Digital Signature Scheme -- Efficient Traitor Tracing Algorithms Using List Decoding -- Block Ciphers -- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis -- Known-IV Attacks on Triple Modes of Operation of Block Ciphers -- Generic Attacks on Feistel Schemes -- A Compact Rijndael Hardware Architecture with S-Box Optimization -- Provable Security -- Provable Security of KASUMI and 3GPP Encryption Mode f8 -- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices -- Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case -- Threshold Cryptography -- Fully Distributed Threshold RSA under Standard Assumptions -- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes -- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks -- Two-Party Protocols -- Oblivious Polynomial Evaluation and Oblivious Neural Learning -- Mutually Independent Commitments -- Zero Knowledge -- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank -- Responsive Round Complexity and Concurrent Zero-Knowledge -- Cryptographic Building Blocks -- Practical Construction and Analysis of Pseudo-Randomness Primitives -- Autocorrelation Coefficients and Correlation Immunity of Boolean Functions -- Elliptic Curve Cryptography -- An Extension of Kedlaya’s Point-Counting Algorithm to Superelliptic Curves -- Supersingular Curves in Cryptography -- Short Signatures from the Weil Pairing -- Self-Blindable Credential Certificates from the Weil Pairing -- Anonymity -- How to Leak a Secret -- Key-Privacy in Public-Key Encryption -- Provably Secure air Blind Signatures with Tight Revocation.
Record Nr. UNISA-996465322403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings / / edited by Colin Boyd
Edizione [1st ed. 2001.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Descrizione fisica 1 online resource (XI, 601 p. 22 illus.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer science—Mathematics
Operating systems (Computers)
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Discrete Mathematics in Computer Science
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-45682-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Lattice Based Cryptography -- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001 -- On the Insecurity of a Server-Aided RSA Protocol -- The Modular Inversion Hidden Number Problem -- Human Identification -- Secure Human Identification Protocols -- Invited Talk -- Unbelievable Security Matching AES Security Using Public Key Systems -- Practical Public Key Cryptography -- A Probable Prime Test with Very High Confidence for n ? 1 mod 4 -- Computation of Discrete Logarithms in -- Speeding Up XTR -- An Efficient Implementation of Braid Groups -- Cryptography Based on Coding Theory -- How to Achieve a McEliece-Based Digital Signature Scheme -- Efficient Traitor Tracing Algorithms Using List Decoding -- Block Ciphers -- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis -- Known-IV Attacks on Triple Modes of Operation of Block Ciphers -- Generic Attacks on Feistel Schemes -- A Compact Rijndael Hardware Architecture with S-Box Optimization -- Provable Security -- Provable Security of KASUMI and 3GPP Encryption Mode f8 -- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices -- Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case -- Threshold Cryptography -- Fully Distributed Threshold RSA under Standard Assumptions -- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes -- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks -- Two-Party Protocols -- Oblivious Polynomial Evaluation and Oblivious Neural Learning -- Mutually Independent Commitments -- Zero Knowledge -- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank -- Responsive Round Complexity and Concurrent Zero-Knowledge -- Cryptographic Building Blocks -- Practical Construction and Analysis of Pseudo-Randomness Primitives -- Autocorrelation Coefficients and Correlation Immunity of Boolean Functions -- Elliptic Curve Cryptography -- An Extension of Kedlaya’s Point-Counting Algorithm to Superelliptic Curves -- Supersingular Curves in Cryptography -- Short Signatures from the Weil Pairing -- Self-Blindable Credential Certificates from the Weil Pairing -- Anonymity -- How to Leak a Secret -- Key-Privacy in Public-Key Encryption -- Provably Secure air Blind Signatures with Tight Revocation.
Record Nr. UNINA-9910143920203321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptography and Coding [[electronic resource] ] : Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings / / edited by Colin Boyd
Cryptography and Coding [[electronic resource] ] : Fifth IMA Conference; Cirencester, UK, December 1995. Proceedings / / edited by Colin Boyd
Edizione [1st ed. 1995.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1995
Descrizione fisica 1 online resource (XI, 297 p.)
Disciplina 003/.54
Collana Lecture Notes in Computer Science
Soggetto topico Computers
Data encryption (Computer science)
Coding theory
Information theory
Combinatorics
Computer communication systems
Information technology
Business—Data processing
Theory of Computation
Cryptology
Coding and Information Theory
Computer Communication Networks
IT in Business
ISBN 3-540-49280-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Design choices and security implications in implementing Diffie-Hellman key agreement -- A broadcast key distribution scheme based on block designs -- Minimal supports in linear codes -- Sequential decoding for a subcode of Reed Solomon Codes -- Linear Span analysis of a set of periodic sequence generators -- Minimal weight k-SR representations -- The main conjecture for MDS codes -- Some decoding applications of minimal realization -- The synthesis of perfect sequences -- Computation of low-weight parity checks for correlation attacks on stream ciphers -- A storage complexity based analogue of Maurer key establishment using public channels -- Soft decision decoding of Reed Solomon codes using the Dorsch algorithm -- Good codes based on very sparse matrices -- Quantum cryptography: Protecting our future networks with quantum mechanics -- Prepaid electronic cheques using public-key certificates -- How traveling salespersons prove their identity -- An elliptic curve analogue of McCurley's key agreement scheme -- Multi-dimensional ring TCM codes for fading channels -- Authentication codes: An area where coding and cryptology meet -- Efficient generation of binary words of given weight -- Distribution of recurrent sequences modulo prime powers -- On-line secret sharing -- Church-Rosser codes -- A new algorithm for finding minimum-weight words in large linear codes -- Coding and cryptography for speech and vision -- Some constructions of generalised concatenated codes based on unit memory codes -- A note on the hash function of Tillich and Zémor -- Cryptanalysis of Harari's identification scheme -- Analysis of sequence segment keying as a method of CDMA transmission -- Constructions for variable-length error-correcting codes.
Record Nr. UNISA-996465583303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1995
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings / / edited by Colin Boyd, Wenbo Mao
Information Security [[electronic resource] ] : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings / / edited by Colin Boyd, Wenbo Mao
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 448 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Special purpose computers
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Special Purpose and Application-Based Systems
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-39981-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Revisiting Software Protection -- Network Security -- Enabling Shared Audit Data -- Cryptographically Generated Addresses (CGA) -- Validating and Securing Spontaneous Associations between Wireless Devices -- Single Sign-On Using Trusted Platforms -- Public-Key Algorithms -- Easy Verifiable Primitives and Practical Public Key Cryptosystems -- Reactively Secure Signature Schemes -- Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation -- A Fast Signature Scheme Based on New On-line Computation -- Cryptographic Protocols -- Distributed RSA Signature Schemes for General Access Structures -- Divisible Voting Scheme -- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations -- The Design and Implementation of Protocol-Based Hidden Key Recovery -- Invited Talk -- Intrinsic Limitations of Digital Signatures and How to Cope with Them -- Protocol Attacks -- On the Security of Fair Non-repudiation Protocols -- Security Analysis of a Password Authenticated Key Exchange Protocol -- Attacks on Public Key Algorithms -- Zero-Value Point Attacks on Elliptic Curve Cryptosystem -- Cryptanalysis of an Algebraic Privacy Homomorphism -- Analysis of the Insecurity of ECMQV with Partially Known Nonces -- Block Ciphers -- Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES -- A Note on Weak Keys of PES, IDEA, and Some Extended Variants -- Foundations of Differential Cryptanalysis in Abelian Groups -- Authorization -- Trust and Authorization in Pervasive B2E Scenarios -- A Logic Model for Temporal Authorization Delegation with Negation -- Watermarking -- Zero-Distortion Authentication Watermarking -- Designated Verification of Non-invertible Watermark -- Software Security -- Proactive Software Tampering Detection -- Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits -- Towards a Business Process-Driven Framework for Security Engineering with the UML -- Codes and Related Issues -- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes -- Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations -- Short c-Secure Fingerprinting Codes -- The Role of Arbiters in Asymmetric Authentication Schemes.
Record Nr. UNISA-996465781803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings / / edited by Colin Boyd, Wenbo Mao
Information Security : 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings / / edited by Colin Boyd, Wenbo Mao
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 448 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer networks
Computers, Special purpose
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Special Purpose and Application-Based Systems
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-39981-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Revisiting Software Protection -- Network Security -- Enabling Shared Audit Data -- Cryptographically Generated Addresses (CGA) -- Validating and Securing Spontaneous Associations between Wireless Devices -- Single Sign-On Using Trusted Platforms -- Public-Key Algorithms -- Easy Verifiable Primitives and Practical Public Key Cryptosystems -- Reactively Secure Signature Schemes -- Validating Digital Signatures without TTP’s Time-Stamping and Certificate Revocation -- A Fast Signature Scheme Based on New On-line Computation -- Cryptographic Protocols -- Distributed RSA Signature Schemes for General Access Structures -- Divisible Voting Scheme -- Unconditionally Secure Homomorphic Pre-distributed Bit Commitment and Secure Two-Party Computations -- The Design and Implementation of Protocol-Based Hidden Key Recovery -- Invited Talk -- Intrinsic Limitations of Digital Signatures and How to Cope with Them -- Protocol Attacks -- On the Security of Fair Non-repudiation Protocols -- Security Analysis of a Password Authenticated Key Exchange Protocol -- Attacks on Public Key Algorithms -- Zero-Value Point Attacks on Elliptic Curve Cryptosystem -- Cryptanalysis of an Algebraic Privacy Homomorphism -- Analysis of the Insecurity of ECMQV with Partially Known Nonces -- Block Ciphers -- Hardware-Focused Performance Comparison for the Standard Block Ciphers AES, Camellia, and Triple-DES -- A Note on Weak Keys of PES, IDEA, and Some Extended Variants -- Foundations of Differential Cryptanalysis in Abelian Groups -- Authorization -- Trust and Authorization in Pervasive B2E Scenarios -- A Logic Model for Temporal Authorization Delegation with Negation -- Watermarking -- Zero-Distortion Authentication Watermarking -- Designated Verification of Non-invertible Watermark -- Software Security -- Proactive Software Tampering Detection -- Run-Time Support for Detection of Memory Access Violations to Prevent Buffer Overflow Exploits -- Towards a Business Process-Driven Framework for Security Engineering with the UML -- Codes and Related Issues -- Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes -- Systematic Treatment of Collusion Secure Codes: Security Definitions and Their Relations -- Short c-Secure Fingerprinting Codes -- The Role of Arbiters in Asymmetric Authentication Schemes.
Record Nr. UNINA-9910768182403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings / / edited by Colin Boyd, Leonie Simpson
Information Security and Privacy [[electronic resource] ] : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings / / edited by Colin Boyd, Leonie Simpson
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 437 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Management information systems
Computer science
Coding theory
Information theory
Application software
E-commerce
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Coding and Information Theory
Computer Appl. in Administrative Data Processing
e-Commerce/e-business
Soggetto genere / forma Conference papers and proceedings.
Soggetto non controllato Information security
ACISP
ISBN 3-642-39059-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysing the IOBC authenticated encryption mode -- A Chosen IV Related Key Attack on Grain -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption -- Minkowski sum based lattice construction for multivariate simultaneous -- Coppersmith's technique and applications to RSA -- Lattices and security proofs -- Adaptive Precision Floating Point LL -- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its Applications -- Towards Privacy Preserving Mobile Internet Communications -- Count-min sketches for estimating password frequency with Hamming Distance -- Secret sharing -- A rational secret sharing protocol with unconditional security in the synchronous setting -- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
Record Nr. UNISA-996465379303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings / / edited by Colin Boyd, Leonie Simpson
Information Security and Privacy : 18th Australasian Conference, ACISP 2013, Brisbane, Australia, July 1-3, 2013, Proceedings / / edited by Colin Boyd, Leonie Simpson
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XII, 437 p. 70 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Cryptography
Data encryption (Computer science)
Electronic data processing—Management
Coding theory
Information theory
Information technology—Management
Electronic commerce
Data and Information Security
Cryptology
IT Operations
Coding and Information Theory
Computer Application in Administrative Data Processing
e-Commerce and e-Business
ISBN 3-642-39059-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysing the IOBC authenticated encryption mode -- A Chosen IV Related Key Attack on Grain -- Cryptanalysis of Helix and Phelix Revisited -- Toward Separating the Strong Adaptive Pseudo-Freeness from the Strong RSA Assumption -- Minkowski sum based lattice construction for multivariate simultaneous -- Coppersmith's technique and applications to RSA -- Lattices and security proofs -- Adaptive Precision Floating Point LL -- Better Lattice Constructions for Solving Multivariate Linear Equations Modulo Unknown Divisors -- Key-Dependent Message Chosen-Ciphertext Security of the Cramer-Shoup Cryptosystem -- Black-Box Separations and their Adaptability to the Non-Uniform Model -- Injective Encodings to Elliptic Curves -- Membership Encryption and Its Applications -- Towards Privacy Preserving Mobile Internet Communications -- Count-min sketches for estimating password frequency with Hamming Distance -- Secret sharing -- A rational secret sharing protocol with unconditional security in the synchronous setting -- Secret Sharing Schemes with Conversion Protocol to Achieve Short Share-Size and Extendibility to Multiparty Computation.
Record Nr. UNINA-9910483330403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings / / edited by Colin Boyd, Juan González Nieto
Information Security and Privacy [[electronic resource] ] : 14th Australasian Conference, ACISP 2009 Brisbane, Australia, July 1-3, 2009 Proceedings / / edited by Colin Boyd, Juan González Nieto
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XI, 470 p.)
Disciplina 004.6
Collana Security and Cryptology
Soggetto topico Computer communication systems
Computer security
Data encryption (Computer science)
Management information systems
Computer science
Coding theory
Information theory
Algorithms
Computer Communication Networks
Systems and Data Security
Cryptology
Management of Computing and Information Systems
Coding and Information Theory
Algorithm Analysis and Problem Complexity
ISBN 3-642-02620-6
Classificazione DAT 050f
DAT 460f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Lecture -- Is the Information Security King Naked? -- Network Security -- Measurement Study on Malicious Web Servers in the .nz Domain -- A Combinatorial Approach for an Anonymity Metric -- On Improving the Accuracy and Performance of Content-Based File Type Identification -- Symmetric Key Encryption -- Attacking 9 and 10 Rounds of AES-256 -- Cryptographic Properties and Application of a Generalized Unbalanced Feistel Network Structure -- Lightweight Block Ciphers Revisited: Cryptanalysis of Reduced Round PRESENT and HIGHT -- Improved Cryptanalysis of the Common Scrambling Algorithm Stream Cipher -- Testing Stream Ciphers by Finding the Longest Substring of a Given Density -- New Correlations of RC4 PRGA Using Nonzero-Bit Differences -- Hash Functions -- Analysis of Property-Preservation Capabilities of the ROX and ESh Hash Domain Extenders -- Characterizing Padding Rules of MD Hash Functions Preserving Collision Security -- Distinguishing Attack on the Secret-Prefix MAC Based on the 39-Step SHA-256 -- Inside the Hypercube -- Meet-in-the-Middle Preimage Attacks on Double-Branch Hash Functions: Application to RIPEMD and Others -- On the Weak Ideal Compression Functions -- Invited Lecture -- Hardening the Network from the Friend Within -- Public Key Cryptography -- Reducing the Complexity in the Distributed Computation of Private RSA Keys -- Efficiency Bounds for Adversary Constructions in Black-Box Reductions -- Building Key-Private Public-Key Encryption Schemes -- Multi-recipient Public-Key Encryption from Simulators in Security Proofs -- Fair Threshold Decryption with Semi-Trusted Third Parties -- Conditional Proxy Broadcast Re-Encryption -- Security on Hybrid Encryption with the Tag-KEM/DEM Framework -- Protocols -- A Highly Scalable RFID Authentication Protocol -- Strengthening the Security of Distributed Oblivious Transfer -- Towards Denial-of-Service-Resilient Key Agreement Protocols -- A Commitment-Consistent Proof of a Shuffle -- Implementation -- Finite Field Multiplication Combining AMNS and DFT Approach for Pairing Cryptography -- Random Order m-ary Exponentiation -- Jacobi Quartic Curves Revisited.
Record Nr. UNISA-996465408203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings / / edited by Colin Boyd, Juan M. González Nieto
Information Security and Privacy [[electronic resource] ] : 10th Australasian Conference, ACISP 2005, Brisbane, Australia, July 4-6, 2005, Proceedings / / edited by Colin Boyd, Juan M. González Nieto
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XIV, 594 p.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Coding theory
Information theory
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- All Sail, No Anchor III: Risk Aggregation and Time’s Arrow -- Network Security -- Traversing Middleboxes with the Host Identity Protocol -- An Investigation of Unauthorised Use of Wireless Networks in Adelaide, South Australia -- An Efficient Solution to the ARP Cache Poisoning Problem -- Cryptanalysis -- On Stern’s Attack Against Secret Truncated Linear Congruential Generators -- On the Success Probability of ? 2-attack on RC6 -- Solving Systems of Differential Equations of Addition -- Group Communications -- A Tree Based One-Key Broadcast Encryption Scheme with Low Computational Overhead -- Dynamic Group Key Agreement in Tree-Based Setting -- Immediate Data Authentication for Multicast in Resource Constrained Network -- Elliptic Curve Cryptography -- Redundant Trinomials for Finite Fields of Characteristic 2 -- Efficient Tate Pairing Computation for Elliptic Curves over Binary Fields -- A Complete Divisor Class Halving Algorithm for Hyperelliptic Curve Cryptosystems of Genus Two -- Mobile Security -- Using “Fair Forfeit” to Prevent Truncation Attacks on Mobile Agents -- An Improved Execution Integrity Solution for Mobile Agents -- RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management -- Side Channel Attacks -- Enhanced DES Implementation Secure Against High-Order Differential Power Analysis in Smartcards -- Improved Zero Value Attack on XTR -- Efficient Representations on Koblitz Curves with Resistance to Side Channel Attacks -- Evaluation and Biometrics -- SIFA: A Tool for Evaluation of High-Grade Security Devices -- Cancelable Key-Based Fingerprint Templates -- Public Key Cryptosystems -- Hybrid Signcryption Schemes with Insider Security -- On the Possibility of Constructing Meaningful Hash Collisions for Public Keys -- Tunable Balancing of RSA -- Access Control I -- Key Management for Role Hierarchy in Distributed Systems -- A Formalization of Distributed Authorization with Delegation -- Signatures I -- Two Improved Partially Blind Signature Schemes from Bilinear Pairings -- On the Security of Nominative Signatures -- Invited Talk -- Who Goes There? Internet Banking: A Matter of Risk and Reward -- Access Control II -- Role Activation Management in Role Based Access Control -- VO-Sec: An Access Control Framework for Dynamic Virtual Organization -- Threshold Cryptography -- An Efficient Implementation of a Threshold RSA Signature Scheme -- GBD Threshold Cryptography with an Application to RSA Key Recovery -- An (n–t)-out-of-n Threshold Ring Signature Scheme -- Protocols I -- Deposit-Case Attack Against Secure Roaming -- Security Requirements for Key Establishment Proof Models: Revisiting Bellare–Rogaway and Jeong–Katz–Lee Protocols -- Group Signatures -- Group Signature Schemes with Membership Revocation for Large Groups -- An Efficient Group Signature Scheme from Bilinear Maps -- Group Signature Where Group Manager, Members and Open Authority Are Identity-Based -- Protocols II -- Analysis of the HIP Base Exchange Protocol -- ID-based Authenticated Key Agreement for Low-Power Mobile Devices -- Signatures II -- On the Security of Two Key-Updating Signature Schemes -- Building Secure Tame-like Multivariate Public-Key Cryptosystems: The New TTS -- Invited Talk -- Potential Impacts of a Growing Gap Between Theory and Practice in Information Security -- Credentials -- Security Analysis and Fix of an Anonymous Credential System -- Counting Abuses Using Flexible Off-line Credentials -- Symmetric Cryptography -- Cryptanalysis of Two Variants of PCBC Mode When Used for Message Integrity -- New Cryptographic Applications of Boolean Function Equivalence Classes.
Record Nr. UNISA-996465830103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy [[electronic resource] ] : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / / edited by Ed Dawson, Andrew Clark, Colin Boyd
Information Security and Privacy [[electronic resource] ] : 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings / / edited by Ed Dawson, Andrew Clark, Colin Boyd
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XIII, 488 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Operating systems (Computers)
Algorithms
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Operating Systems
Algorithm Analysis and Problem Complexity
ISBN 3-540-45030-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Network Security I -- Protecting Confidentiality against Trojan Horse Programs in Discretionary Access Control System -- Towards a New Authorisation Paradigm for Extranets -- Custom Safety Policies in Safe Erlang -- Public Key Cryptography -- A Proposal of a New Public Key Cryptosystem Using Matrices over a Ring -- Secure Length-Saving ElGamal Encryption under the Computational Diffie-Hellman Assumption -- Efficient Scalar Multiplications on Elliptic Curves without Repeated Doublings and Their Practical Performance -- Network Security II -- High Performance Agile Crypto Modules -- A Three-Party HTTP Proxy to Support Internet Content Regulation -- Cryptographic Implementation Issues -- Cryptanalysis of the m – Permutation Protection Schemes -- An Implementation of Bitsliced DES on the Pentium MMXTM Processor -- Electronic Commerce I -- Securing Large E-Commerce Networks -- Passive Entities: A Strategy for Electronic Payment Design -- Key Recovery -- Key Recovery System for the Commercial Environment -- A Key Escrow Scheme with Time-Limited Monitoring for One-Way Communication -- Public Key Infrastructure -- Key Management for Secure Multicast with Dynamic Controller -- PKI Seeks a Trusting Relationship -- The PKI Specification Dilemma: A Formal Solution -- Boolean Functions -- Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator -- Security Weaknesses in a Randomized Stream Cipher -- Two-Stage Optimisation in the Design of Boolean Functions -- Intrusion Detection -- A Novel Engine for Various Intrusion Detection Methods -- Codes -- Construction and Categories of Codes -- Digital Signatures I -- Cryptanalysis of Polynomial Authentication and Signature Scheme -- Secure Transactions with Mobile Agents in Hostile Environments -- A Multisignature Scheme with Message Flexibility, Order Flexibility and Order Verifiability -- Secret Sharing I -- Light Weight Broadcast Exclusion Using Secret Sharing -- Cheating Prevention in Secret Sharing -- On Multiplicative Secret Sharing Schemes -- Digital Signatures II -- On the Security of the RSA-Based Multisignature Scheme for Various Group Structures -- Fail-Stop Confirmer Signatures -- An Extremely Small and Efficient Identification Scheme -- Protocols -- An Anonymous Electronic Bidding Protocol Based on a New Convertible Group Signature Scheme -- AKA Protocols for Mobile Communications -- Electronic Commerce II -- A Three Phased Schema for Sealed Bid Auction System Design -- An Online Public Auction Protocol Protecting Bidder Privacy -- Secret Sharing II -- Algorithms to Speed Up Computations in Threshold RSA -- Sharing Block Ciphers -- Keynote Papers -- All Sail, No Anchor, I: Cryptography, Risk, and e-Commerce -- Professional Ethics in a Security and Privacy Context – the Perspective of a National Computing Society.
Record Nr. UNISA-996465816303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui