top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Arithmetic of Finite Fields [[electronic resource] ] : Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010, Proceedings / / edited by M. Anwar Hasan, Tor Helleseth
Arithmetic of Finite Fields [[electronic resource] ] : Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010, Proceedings / / edited by M. Anwar Hasan, Tor Helleseth
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (280 p. 41 illus.)
Disciplina 512.32
Collana Theoretical Computer Science and General Issues
Soggetto topico Computer programming
Computer science—Mathematics
Discrete mathematics
Algorithms
Cryptography
Data encryption (Computer science)
Computer networks
Programming Techniques
Symbolic and Algebraic Manipulation
Discrete Mathematics in Computer Science
Cryptology
Computer Communication Networks
ISBN 1-280-38738-6
9786613565303
3-642-13797-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk 1 -- Recursive Towers of Function Fields over Finite Fields -- Efficient Finite Field Arithmetic -- High-Performance Modular Multiplication on the Cell Processor -- A Modified Low Complexity Digit-Level Gaussian Normal Basis Multiplier -- Type-II Optimal Polynomial Bases -- Pseudo-random Numbers and Sequences -- Pseudorandom Vector Sequences Derived from Triangular Polynomial Systems with Constant Multipliers -- Structure of Pseudorandom Numbers Derived from Fermat Quotients -- Boolean Functions -- Distribution of Boolean Functions According to the Second-Order Nonlinearity -- Hyper-bent Boolean Functions with Multiple Trace Terms -- Invited Talk 2 -- On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings -- Functions, Equations and Modular Multiplication -- Switching Construction of Planar Functions on Finite Fields -- Solving Equation Systems by Agreeing and Learning -- Speeding Up Bipartite Modular Multiplication -- Finite Field Arithmetic for Pairing Based Cryptography -- Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography -- Delaying Mismatched Field Multiplications in Pairing Computations -- Invited Talk 3 -- Regenerating Codes for Distributed Storage Networks -- Finite Fields, Cryptography and Coding -- On Rationality of the Intersection Points of a Line with a Plane Quartic -- Reflections about a Single Checksum -- Efficient Time-Area Scalable ECC Processor Using ?-Coding Technique.
Record Nr. UNISA-996465667103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Arithmetic of finite fields : Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010 : proceedings / / M. Anwar Hasan, Tor Helleseth (eds.)
Arithmetic of finite fields : Third International Workshop, WAIFI 2010, Istanbul, Turkey, June 27-30, 2010 : proceedings / / M. Anwar Hasan, Tor Helleseth (eds.)
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Springer, 2010
Descrizione fisica 1 online resource (280 p. 41 illus.)
Disciplina 512.32
Altri autori (Persone) HasanM. Anwar
HellesethTor
Collana Lecture notes in computer science
LNCS sublibrary. SL 1, Theoretical computer science and general issues
Soggetto topico Finite fields (Algebra)
Mappings (Mathematics)
Curves, Algebraic
ISBN 1-280-38738-6
9786613565303
3-642-13797-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk 1 -- Recursive Towers of Function Fields over Finite Fields -- Efficient Finite Field Arithmetic -- High-Performance Modular Multiplication on the Cell Processor -- A Modified Low Complexity Digit-Level Gaussian Normal Basis Multiplier -- Type-II Optimal Polynomial Bases -- Pseudo-random Numbers and Sequences -- Pseudorandom Vector Sequences Derived from Triangular Polynomial Systems with Constant Multipliers -- Structure of Pseudorandom Numbers Derived from Fermat Quotients -- Boolean Functions -- Distribution of Boolean Functions According to the Second-Order Nonlinearity -- Hyper-bent Boolean Functions with Multiple Trace Terms -- Invited Talk 2 -- On the Efficiency and Security of Pairing-Based Protocols in the Type 1 and Type 4 Settings -- Functions, Equations and Modular Multiplication -- Switching Construction of Planar Functions on Finite Fields -- Solving Equation Systems by Agreeing and Learning -- Speeding Up Bipartite Modular Multiplication -- Finite Field Arithmetic for Pairing Based Cryptography -- Constructing Tower Extensions of Finite Fields for Implementation of Pairing-Based Cryptography -- Delaying Mismatched Field Multiplications in Pairing Computations -- Invited Talk 3 -- Regenerating Codes for Distributed Storage Networks -- Finite Fields, Cryptography and Coding -- On Rationality of the Intersection Points of a Line with a Plane Quartic -- Reflections about a Single Checksum -- Efficient Time-Area Scalable ECC Processor Using ?-Coding Technique.
Record Nr. UNINA-9910483746003321
New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXIII, 420 p. 139 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Software engineering
Security
Privacy
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Software Engineering
ISBN 3-319-49445-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deep learning and Fault Based Attacks -- Leakage, Power and Fault Analysis -- Applied cryptography -- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology.
Record Nr. UNISA-996465511303316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Security, Privacy, and Applied Cryptography Engineering : 6th International Conference, SPACE 2016, Hyderabad, India, December 14-18, 2016, Proceedings / / edited by Claude Carlet, M. Anwar Hasan, Vishal Saraswat
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (XXIII, 420 p. 139 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data protection
Computer security
Data encryption (Computer science)
Management information systems
Computer science
Algorithms
Software engineering
Security
Privacy
Cryptology
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Software Engineering
ISBN 3-319-49445-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deep learning and Fault Based Attacks -- Leakage, Power and Fault Analysis -- Applied cryptography -- Iterative ciphers -- Hardware security -- Security -- Post-quantum cryptology.
Record Nr. UNINA-9910483609103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected areas in cryptography : 11th international workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004 : revised selected papers / / Helena Handschuh, M. Anwar Hasan (eds.)
Selected areas in cryptography : 11th international workshop, SAC 2004, Waterloo, Canada, August 9-10, 2004 : revised selected papers / / Helena Handschuh, M. Anwar Hasan (eds.)
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, : Springer, 2005
Descrizione fisica 1 online resource (XI, 354 p.)
Disciplina 005.8/2
Altri autori (Persone) HandschuhHelena
HasanM. Anwar
Collana Lecture notes in computer science
Soggetto topico Computer security
Data encryption (Computer science)
Cryptography
ISBN 3-540-30564-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stream Cipher Cryptanalysis -- An Improved Correlation Attack on A5/1 -- Extending the Resynchronization Attack -- A New Simple Technique to Attack Filter Generators and Related Ciphers -- Side-Channel Analysis -- On XTR and Side-Channel Analysis -- Provably Secure Masking of AES -- Block Cipher Design -- Perfect Diffusion Primitives for Block Ciphers -- Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results -- FOX : A New Family of Block Ciphers -- Efficient Implementations -- A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue -- Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity -- Modular Number Systems: Beyond the Mersenne Family -- Efficient Doubling on Genus Two Curves over Binary Fields -- Secret Key Cryptography I -- About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations) -- A Subliminal Channel in Secret Block Ciphers -- Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes -- Cryptanalysis -- Cryptanalysis of a White Box AES Implementation -- Predicting Subset Sum Pseudorandom Generators -- Collision Attack and Pseudorandomness of Reduced-Round Camellia -- Cryptographic Protocols -- Password Based Key Exchange with Mutual Authentication -- Product Construction of Key Distribution Schemes for Sensor Networks -- Deterministic Key Predistribution Schemes for Distributed Sensor Networks -- On Proactive Secret Sharing Schemes -- Secret Key Cryptography II -- Efficient Constructions of Variable-Input-Length Block Ciphers -- A Sufficient Condition for Optimal Domain Extension of UOWHFs.
Altri titoli varianti SAC 2004
Record Nr. UNINA-9910481958603321
Berlin, : Springer, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui