top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Cryptography and Information Security in the Balkans [[electronic resource] ] : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers / / edited by Enes Pasalic, Lars R. Knudsen
Cryptography and Information Security in the Balkans [[electronic resource] ] : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers / / edited by Enes Pasalic, Lars R. Knudsen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (VIII, 207 p. 19 illus.)
Disciplina 652.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptology
Systems and Data Security
ISBN 3-319-29172-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric key cryptography -- Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes -- Results on characterizations of vectorial Bent and Plateaued Functions in arbitrary characteristic p -- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes -- Time-Success Ratios under Simple Transformations: Analysis and Applications -- Security and protocols -- Synchronous Universally Composable Computer Networks -- Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps -- Closing the Gap: A Universal Privacy Framework for Outsourced Data -- Implementation and verifiable encryption -- On the Efficient Arithmetic for Lattice-Based Cryptography on GPU Using the CUDA Platform -- cuHE: A Homomorphic Encryption Accelerator Library -- Extended Functionality in Verifiable Searchable Encryption.
Record Nr. UNISA-996466357003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptography and Information Security in the Balkans : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers / / edited by Enes Pasalic, Lars R. Knudsen
Cryptography and Information Security in the Balkans : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers / / edited by Enes Pasalic, Lars R. Knudsen
Edizione [1st ed. 2016.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Descrizione fisica 1 online resource (VIII, 207 p. 19 illus.)
Disciplina 652.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Cryptology
Systems and Data Security
ISBN 3-319-29172-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Symmetric key cryptography -- Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes -- Results on characterizations of vectorial Bent and Plateaued Functions in arbitrary characteristic p -- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm -- Cryptanalysis -- Analysis of the Authenticated Cipher MORUS -- Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes -- Time-Success Ratios under Simple Transformations: Analysis and Applications -- Security and protocols -- Synchronous Universally Composable Computer Networks -- Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps -- Closing the Gap: A Universal Privacy Framework for Outsourced Data -- Implementation and verifiable encryption -- On the Efficient Arithmetic for Lattice-Based Cryptography on GPU Using the CUDA Platform -- cuHE: A Homomorphic Encryption Accelerator Library -- Extended Functionality in Verifiable Searchable Encryption.
Record Nr. UNINA-9910484908103321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography [[electronic resource] ] : 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers / / edited by Lars R. Knudsen, Huapeng Wu
Selected Areas in Cryptography [[electronic resource] ] : 19th International Conference, SAC 2012, Windsor, Canada, August 15-16, 2012, Revised Selected Papers / / edited by Lars R. Knudsen, Huapeng Wu
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XIV, 407 p. 61 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Algorithms
Computer communication systems
Application software
Cryptology
Systems and Data Security
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Information Systems Applications (incl. Internet)
ISBN 3-642-35999-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao – Lai White-Box AES Implementation -- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model -- Forward Secure Signatures on Smart Cards -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the “Kindle” Cipher -- Cryptographically Strong de Bruijn Sequences with Large Periods -- Cryptanalysis of the Loiss Stream Cipher -- Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three -- Efficient Implementation of Bilinear Pairings on ARM Processors -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach -- Improved Cryptanalysis of the Block Cipher KASUMI -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers -- Attacking (EC)DSA Given Only an Implicit Hint -- Lattice Reduction for Modular Knapsack -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function -- Provable Security of BLAKE with Non-ideal Compression Function -- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
Record Nr. UNISA-996465975803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui