Algebra, Codes and Cryptology : First International Conference, A2C 2019 in honor of Prof. Mamadou Sanghare, Dakar, Senegal, December 5–7, 2019, Proceedings / / edited by Cheikh Thiecoumba Gueye, Edoardo Persichetti, Pierre-Louis Cayrel, Johannes Buchmann |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (246 pages) |
Disciplina |
004
005.7 |
Collana | Communications in Computer and Information Science |
Soggetto topico |
Computers
Computer communication systems Data encryption (Computer science) Computer security Numerical analysis Optical data processing Information Systems and Communication Service Computer Communication Networks Cryptology Systems and Data Security Numeric Computing Image Processing and Computer Vision |
ISBN | 3-030-36237-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910357843203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Homomorphic Signature Schemes : A Survey / / by Giulia Traverso, Denise Demirel, Johannes Buchmann |
Autore | Traverso Giulia |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (73 p.) |
Disciplina | 004 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Data structures (Computer science)
Discrete mathematics Data Structures and Information Theory Discrete Mathematics |
ISBN | 3-319-32115-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Chapter 1 From Digital to Homomorphic Signature Schemes -- Chapter 2 Homomorphic Signature Schemes -- Chapter 3 Evaluation of Homomorphic Signature Schemes -- Chapter 4 State of the Art of Homomorphic Signature Schemes -- Chapter 5 Suitable Homomorphic Signature Schemes for eVoting, Smart Grids, and eHealth -- Chapter 6 Conclusion -- References. . |
Record Nr. | UNINA-9910254981303321 |
Traverso Giulia | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Internet Privacy : Options for adequate realisation / / edited by Johannes Buchmann |
Edizione | [1st ed. 2013.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2013 |
Descrizione fisica | 1 online resource (105 p.) |
Disciplina |
005.8
300 |
Collana | acatech STUDIE |
Soggetto topico |
Electrical engineering
Optical data processing Social sciences Information technology Business—Data processing Mass media Law Communications Engineering, Networks Computer Imaging, Vision, Pattern Recognition and Graphics Social Sciences, general IT in Business IT Law, Media Law, Intellectual Property |
ISBN | 3-642-37913-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Core values and their relation to privacy -- The Characteristics and Benefits of Online Social Networks -- Characterization of E-Commerce -- Privacy Threats and their Impact on the Core Values -- Options for Achieving Privacy in Online Social Networks and E-Commerce. |
Record Nr. | UNINA-9910438047803321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer Vieweg, , 2013 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Post-quantum cryptography : second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings / / [edited by] Johannes Buchmann, Jintai Ding |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (X, 231 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) |
ISBN | 3-540-88403-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. |
Record Nr. | UNINA-9910483046403321 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Post-quantum cryptography : second international workshop, PQCrypto 2008 Cincinnati, OH, USA, October 17-19, 2008 proceedings / / [edited by] Johannes Buchmann, Jintai Ding |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
Descrizione fisica | 1 online resource (X, 231 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Cryptography
Data encryption (Computer science) |
ISBN | 3-540-88403-3 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | A New Efficient Threshold Ring Signature Scheme Based on Coding Theory -- Square-Vinegar Signature Scheme -- Attacking and Defending the McEliece Cryptosystem -- McEliece Cryptosystem Implementation: Theory and Practice -- Merkle Tree Traversal Revisited -- Explicit Hard Instances of the Shortest Vector Problem -- Practical-Sized Instances of Multivariate PKCs: Rainbow, TTS, and ?IC-Derivatives -- Digital Signatures Out of Second-Preimage Resistant Hash Functions -- Cryptanalysis of Rational Multivariate Public Key Cryptosystems -- Syndrome Based Collision Resistant Hashing -- Nonlinear Piece In Hand Perturbation Vector Method for Enhancing Security of Multivariate Public Key Cryptosystems -- On the Power of Quantum Encryption Keys -- Secure PRNGs from Specialized Polynomial Maps over Any -- MXL2: Solving Polynomial Equations over GF(2) Using an Improved Mutant Strategy -- Side Channels in the McEliece PKC. |
Record Nr. | UNISA-996465577503316 |
Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Praxis der Manuellen Medizin bei Säuglingen und Kindern : Technik der manualmedizinisch-osteopathischen Untersuchung und Behandlung / / von Irmgard Seifert, Thomas Schnellbacher, Johannes Buchmann |
Autore | Seifert Irmgard |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (CCXXXIII, 8 S. 280 Abb. in Farbe.) |
Disciplina | 616.7 |
Soggetto topico |
Orthopedics
Conservative Orthopedics |
ISBN | 3-662-52750-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | ger |
Nota di contenuto | Allgemeine Prinzipien der Diagnostik und Therapie -- Das Säuglingsalter: Untersuchungstechniken unter Berücksichtigung der Entwicklungsdiagnostik und Behandlungstechniken -- Das Kleinkind- und Schulalter: kindgerechte Untersuchungs- und Behandlungstechniken. |
Record Nr. | UNINA-9910483746203321 |
Seifert Irmgard | ||
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Privately and Publicly Verifiable Computing Techniques : A Survey / / by Denise Demirel, Lucas Schabhüser, Johannes Buchmann |
Autore | Demirel Denise |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XII, 64 p.) |
Disciplina | 615.190285424 |
Collana | SpringerBriefs in Computer Science |
Soggetto topico |
Data structures (Computer science)
Computer science—Mathematics Discrete mathematics Computer software—Reusability Data Structures and Information Theory Mathematics of Computing Discrete Mathematics Performance and Reliability |
ISBN | 3-319-53798-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Introduction -- Preliminaries -- Proof Based Verifiable Computing -- Verifiable Computing from Fully Homomorphic Encryption -- Homomorphic Authenticators -- Verifiable Computing Frameworks from Functional Encryption and Functional Signatures -- Verifiable Computing for Specific Applications -- Analysis of the State of the Art -- Conclusion. |
Record Nr. | UNINA-9910254824103321 |
Demirel Denise | ||
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Cryptology – AFRICACRYPT 2019 [[electronic resource] ] : 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings / / edited by Johannes Buchmann, Abderrahmane Nitaj, Tajjeeddine Rachidi |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 449 p. 705 illus., 52 illus. in color.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computers Coding theory Information theory Software engineering Systems and Data Security Computer Communication Networks Computing Milieux Coding and Information Theory Software Engineering |
ISBN | 3-030-23696-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protocols -- Tiny WireGuard Tweak -- Extended 3-Party ACCE and Application to LoRaWAN 1.1 -- Post-Quantum Cryptography -- The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem -- Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies -- An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric -- Zero-Knowledge -- UC-Secure CRS Generation for SNARKs -- On the Efficiency of Privacy-Preserving Smart Contract Systems -- Lattice Based Cryptography -- Ring Signatures based on Middle-Product Learning with Errors Problems -- Sampling the Integers with Low Relative Error -- A Refined Analysis of the Cost for Solving LWE via uSVP -- New Schemes and Analysis -- Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 -- Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher -- An Improvement of Correlation Analysis for Vectorial Boolean Functions -- Block Ciphers -- On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T -- Practical Attacks on Reduced-Round AES -- Six Shades of AES -- Side-Channel Attacks and Countermeasures -- Revisiting Location Privacy from a Side-Channel Analysis Viewpoint -- Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures -- Analysis of Two Countermeasures against the Signal Leakage Attack -- Signatures -- Handling Vinegar Variables to Shorten Rainbow Key Pairs -- Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups -- A New Approach to Modelling Centralised Reputation Systems. |
Record Nr. | UNISA-996466454303316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology – AFRICACRYPT 2019 : 11th International Conference on Cryptology in Africa, Rabat, Morocco, July 9–11, 2019, Proceedings / / edited by Johannes Buchmann, Abderrahmane Nitaj, Tajjeeddine Rachidi |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (XVI, 449 p. 705 illus., 52 illus. in color.) |
Disciplina |
005.8
005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Computer communication systems Computers Coding theory Information theory Software engineering Systems and Data Security Computer Communication Networks Computing Milieux Coding and Information Theory Software Engineering |
ISBN | 3-030-23696-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Protocols -- Tiny WireGuard Tweak -- Extended 3-Party ACCE and Application to LoRaWAN 1.1 -- Post-Quantum Cryptography -- The Mersenne Low Hamming Combination Search Problem can be reduced to an ILP Problem -- Simple Oblivious Transfer Protocols Compatible with Supersingular Isogenies -- An IND-CCA-Secure Code-Based Encryption Scheme Using Rank Metric -- Zero-Knowledge -- UC-Secure CRS Generation for SNARKs -- On the Efficiency of Privacy-Preserving Smart Contract Systems -- Lattice Based Cryptography -- Ring Signatures based on Middle-Product Learning with Errors Problems -- Sampling the Integers with Low Relative Error -- A Refined Analysis of the Cost for Solving LWE via uSVP -- New Schemes and Analysis -- Memory-Efficient High-Speed Implementation of Kyber on Cortex-M4 -- Reducing the Cost of Authenticity with Leakages: a CIML2-Secure AE Scheme with One Call to a Strongly Protected Tweakable Block Cipher -- An Improvement of Correlation Analysis for Vectorial Boolean Functions -- Block Ciphers -- On MILP-Based Automatic Search for Differential Trails Through Modular Additions with Application to Bel-T -- Practical Attacks on Reduced-Round AES -- Six Shades of AES -- Side-Channel Attacks and Countermeasures -- Revisiting Location Privacy from a Side-Channel Analysis Viewpoint -- Side Channel Analysis of SPARX-64/128: Cryptanalysis and Countermeasures -- Analysis of Two Countermeasures against the Signal Leakage Attack -- Signatures -- Handling Vinegar Variables to Shorten Rainbow Key Pairs -- Further Lower Bounds for Structure-Preserving Signatures in Asymmetric Bilinear Groups -- A New Approach to Modelling Centralised Reputation Systems. |
Record Nr. | UNINA-9910349315703321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Public Key Cryptography -- PKC 2012 [[electronic resource] ] : 15th International Conference on Practice and Theory in Public Key Cryptography, Darmstadt, Germany, May 21-23, 2012, Proceedings / / edited by Marc Fischlin, Johannes Buchmann, Mark Manulis |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIV, 734 p. 63 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Management information systems Computer science Algorithms Computer security Computer science—Mathematics Cryptology Computer Communication Networks Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Systems and Data Security Discrete Mathematics in Computer Science |
Soggetto genere / forma | Conference proceedings. |
ISBN | 3-642-30057-X |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465396203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|