top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Information and Computer Security [[electronic resource] ] : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings / / edited by Goichiro Hanaoka, Toshihiro Yamauchi
Advances in Information and Computer Security [[electronic resource] ] : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012, Proceedings / / edited by Goichiro Hanaoka, Toshihiro Yamauchi
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XII, 261 p. 33 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Management information systems
Computer science
Data encryption (Computer science)
Computer science—Mathematics
Computer communication systems
Algorithms
Systems and Data Security
Management of Computing and Information Systems
Cryptology
Discrete Mathematics in Computer Science
Computer Communication Networks
Algorithm Analysis and Problem Complexity
ISBN 3-642-34117-9
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Model-Based Conformance Testing for Android -- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography -- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU -- Very Short Critical Path Implementation of AES with Direct Logic Gates -- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary -- Compact Stateful Encryption Schemes with Ciphertext Verifiability -- Structured Encryption for Conceptual Graphs -- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability -- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI -- Boomerang Distinguishers for Full HAS-160 Compression Function -- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function -- Annihilators of Fast Discrete Fourier Spectra Attacks -- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher -- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security -- Efficient Secure Primitive for Privacy Preserving Distributed Computations -- Generic Construction of GUC Secure Commitment in the KRK Model.
Record Nr. UNISA-996466207203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (538 pages)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Application software
Coding theory
Public key cryptography
ISBN 3-030-97131-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910548172603321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (655 pages)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Application software
Public key cryptography
ISBN 3-030-97121-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464544903316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part II / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (538 pages)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Application software
Coding theory
Public key cryptography
ISBN 3-030-97131-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464542003316
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Public-key cryptography - PKC 2022 : 25th IACR international conference on practice and theory of public-key cryptography, virtual event, March 8-11, 2022, proceedings, part I / / edited by Goichiro Hanaoka, Junji Shikata and Yohei Watanabe
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2022]
Descrizione fisica 1 online resource (655 pages)
Disciplina 005.824
Collana Lecture Notes in Computer Science
Soggetto topico Software engineering
Application software
Public key cryptography
ISBN 3-030-97121-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910548176203321
Cham, Switzerland : , : Springer, , [2022]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public-Key Cryptography -- PKC 2013 [[electronic resource] ] : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Public-Key Cryptography -- PKC 2013 [[electronic resource] ] : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 518 p. 46 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
E-commerce
Application software
Cryptology
Systems and Data Security
Coding and Information Theory
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36362-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Record Nr. UNISA-996466237803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public-Key Cryptography -- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Public-Key Cryptography -- PKC 2013 : 16th International Conference on Practice and Theory in Public-Key Cryptography, Nara, Japan, February 26 -- March 1, 2013, Proceedings / / edited by Kaoru Kurosawa, Goichiro Hanaoka
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 518 p. 46 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
E-commerce
Application software
Cryptology
Systems and Data Security
Coding and Information Theory
e-Commerce/e-business
Computer Appl. in Administrative Data Processing
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36362-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Packed Ciphertexts in LWE-Based Homomorphic Encryption.- Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security. Feasibility and Infeasibility of Adaptively Secure Fully Homomorphic Encryption.- Chosen Ciphertext Secure Keyed-Homomorphic Public-Key Encryption.- Functional Encryption: Origins and Recent Developments.- Vector Commitments and Their Applications.- Efficient, Adaptively Secure, and Composable Oblivious Transfer with a Single, Global CRS.- Cryptography Using Captcha Puzzles.- Improved Zero-Knowledge Proofs of Knowledge for the ISIS Problem, and Applications.- Decentralized Attribute-Based Signatures.- On the Semantic Security of Functional Encryption Schemes.- Attribute-Based Encryption with Fast Decryption.- Recovering RSA Secret Keys from Noisy Key Bits with Erasures and Errors.- Combined Attack on CRT-RSA: Why Public Verification Must Not Be Public.- Revocable Identity-Based Encryption Revisited: Security Model and Construction.- Improved (Hierarchical) Inner-Product Encryption from Lattices.- Techniques for Efficient Secure Computation Based on Yao’s Protocol.- Non-Interactive Key Exchange.- Efficient UC-Secure Authenticated Key-Exchange for Algebraic Languages.- Tighter Reductions for Forward-Secure Signature Schemes.- Tagged One-Time Signatures: Tight Security and Optimal Tag Size -- Key Encapsulation Mechanisms from Extractable Hash Proof Systems, Revisited.- Robust Encryption, Revisited.- Sender-Equivocable Encryption Schemes Secure against Chosen-Ciphertext Attacks Revisited -- Efficient Completely Context-Hiding Quotable and Linearly Homomorphic Signatures.- Verifiably Encrypted Signatures with Short Keys Based on the Decisional Linear Problem and Obfuscation for Encrypted VES.- Sequential Aggregate Signatures with Short Public Keys: Design, Analysis and Implementation Studies.- New Constructions and Applications of Trapdoor DDH Groups.- Rate-Limited Secure Function Evaluation: Definitions and Constructions -- Verifiable Elections That Scale for Free.- On the Connection between Leakage Tolerance and Adaptive Security.
Record Nr. UNINA-9910484384903321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui