top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Pairing-Based Cryptography -- Pairing 2012 [[electronic resource] ] : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Pairing-Based Cryptography -- Pairing 2012 [[electronic resource] ] : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 333 p. 18 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Algorithms
Cryptology
Systems and Data Security
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36334-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466247403316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Pairing-Based Cryptography -- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Pairing-Based Cryptography -- Pairing 2012 : 5th International Conference, Cologne, Germany, May 16-18, 2012, Revised Selected Papers / / edited by Michel Abdalla, Tanja Lange
Edizione [1st ed. 2013.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Descrizione fisica 1 online resource (XVI, 333 p. 18 illus.)
Disciplina 005.8/2
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Coding theory
Information theory
Algorithms
Cryptology
Systems and Data Security
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Soggetto genere / forma Conference proceedings.
ISBN 3-642-36334-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910739479603321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2013
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography [[electronic resource] ] : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Post-Quantum Cryptography [[electronic resource] ] : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 529 p. 59 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Coding theory
Information theory
Logic design
Cryptology
Software Engineering/Programming and Operating Systems
Coding and Information Theory
Logic Design
ISBN 3-319-79063-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Code-based Cryptography -- Cryptanalysis -- Hash-based Cryptography -- Isogenies in Cryptography -- Lattice-based Cryptography -- Multivariate Cryptography -- Protocols -- Quantum Algorithms.
Record Nr. UNISA-996465611003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Post-Quantum Cryptography : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 529 p. 59 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Coding theory
Information theory
Logic design
Cryptology
Software Engineering/Programming and Operating Systems
Coding and Information Theory
Logic Design
ISBN 3-319-79063-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Code-based Cryptography -- Cryptanalysis -- Hash-based Cryptography -- Isogenies in Cryptography -- Lattice-based Cryptography -- Multivariate Cryptography -- Protocols -- Quantum Algorithms.
Record Nr. UNINA-9910349423903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography [[electronic resource] ] : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / / edited by Tanja Lange, Tsuyoshi Takagi
Post-Quantum Cryptography [[electronic resource] ] : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / / edited by Tanja Lange, Tsuyoshi Takagi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 427 p. 34 illus.)
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Software engineering
Coding theory
Information theory
Cryptology
Systems and Data Security
Software Engineering
Coding and Information Theory
ISBN 3-319-59879-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466282203316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / / edited by Tanja Lange, Tsuyoshi Takagi
Post-Quantum Cryptography : 8th International Workshop, PQCrypto 2017, Utrecht, The Netherlands, June 26-28, 2017, Proceedings / / edited by Tanja Lange, Tsuyoshi Takagi
Edizione [1st ed. 2017.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Descrizione fisica 1 online resource (XII, 427 p. 34 illus.)
Disciplina 005.824
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Software engineering
Coding theory
Information theory
Cryptology
Systems and Data Security
Software Engineering
Coding and Information Theory
ISBN 3-319-59879-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910484781403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in Cryptology - AFRICACRYPT 2010 [[electronic resource] ] : Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings / / edited by Daniel J. Bernstein, Tanja Lange
Progress in Cryptology - AFRICACRYPT 2010 [[electronic resource] ] : Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings / / edited by Daniel J. Bernstein, Tanja Lange
Edizione [1st ed. 2010.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Descrizione fisica 1 online resource (XIII, 437 p. 43 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Management information systems
Computer science
Algorithms
Computer security
Operating systems (Computers)
Cryptology
Computer Communication Networks
Management of Computing and Information Systems
Algorithm Analysis and Problem Complexity
Systems and Data Security
Operating Systems
ISBN 1-280-38637-1
9786613564290
3-642-12678-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Signatures -- A New RSA-Based Signature Scheme -- Fair Blind Signatures without Random Oracles -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics Cards -- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over -- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits -- Protocols -- Proofs of Restricted Shuffles -- Batch Range Proof for Practical Small Ranges -- Optimistic Fair Priced Oblivious Transfer -- Networks -- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes -- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes -- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience -- Elliptic Curves -- Avoiding Full Extension Field Arithmetic in Pairing Computations -- ECC2K-130 on Cell CPUs -- Side-Channel Attacks and Fault Attacks -- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator -- Differential Fault Analysis of HC-128 -- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices -- Public-Key Encryption -- Strong Cryptography from Weak Secrets -- Efficient Unidirectional Proxy Re-Encryption -- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions -- Keys and PUFs -- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys -- Quantum Readout of Physical Unclonable Functions -- Ciphers and Hash Functions -- Parallelizing the Camellia and SMS4 Block Ciphers -- Improved Linear Differential Attacks on CubeHash -- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Record Nr. UNISA-996465295303316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2010
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology - INDOCRYPT 2006 [[electronic resource] ] : 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings / / edited by Rana Barua, Tanja Lange
Progress in Cryptology - INDOCRYPT 2006 [[electronic resource] ] : 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings / / edited by Rana Barua, Tanja Lange
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 458 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Algorithms
Computer science—Mathematics
Computer security
Computer communication systems
Management information systems
Computer science
Cryptology
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Systems and Data Security
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-49769-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Whither Cryptography? -- Symmetric Cryptography: Attacks -- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 -- Differential and Rectangle Attacks on Reduced-Round SHACAL-1 -- Algebraic Attacks on Clock-Controlled Cascade Ciphers -- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication -- Hash Functions -- Update on Tiger -- RC4-Hash: A New Hash Function Based on RC4 -- Security of VSH in the Real World -- Provable Security: Key Agreement -- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols -- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols -- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols -- Invited Talk -- Another Look at “Provable Security”. II -- Provable Security: Public Key Cryptography -- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions -- General Conversion for Obtaining Strongly Existentially Unforgeable Signatures -- Conditionally Verifiable Signature -- Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission -- Symmetric Cryptography: Design -- Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks -- Enciphering with Arbitrary Small Finite Domains -- Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240 -- Modes of Operation and Message Authentication Codes -- Symmetric Nonce Respecting Security Model and the MEM Mode of Operation -- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach -- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function -- A Simple and Unified Method of Proving Indistinguishability -- Fast Implementation of Public Key Cryptography -- Extended Double-Base Number System with Applications to Elliptic Curve Cryptography -- CMSS – An Improved Merkle Signature Scheme -- ID-Based Cryptography -- Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature -- Secure Cryptographic Workflow in the Standard Model -- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext -- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction -- Embedded System and Side Channel Attacks -- AES Software Implementations on ARM7TDMI -- Galois LFSR, Embedded Devices and Side Channel Weaknesses.
Record Nr. UNISA-996466063503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – LATINCRYPT 2017 [[electronic resource] ] : 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papers / / edited by Tanja Lange, Orr Dunkelman
Progress in Cryptology – LATINCRYPT 2017 [[electronic resource] ] : 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papers / / edited by Tanja Lange, Orr Dunkelman
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 415 p. 635 illus., 24 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Computers and civilization
Application software
Logic design
Coding theory
Information theory
Cryptology
Software Engineering
Computers and Society
Information Systems Applications (incl. Internet)
Logic Design
Coding and Information Theory
ISBN 3-030-25283-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996466429503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – LATINCRYPT 2017 : 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papers / / edited by Tanja Lange, Orr Dunkelman
Progress in Cryptology – LATINCRYPT 2017 : 5th International Conference on Cryptology and Information Security in Latin America, Havana, Cuba, September 20–22, 2017, Revised Selected Papers / / edited by Tanja Lange, Orr Dunkelman
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 415 p. 635 illus., 24 illus. in color.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Computers and civilization
Application software
Logic design
Coding theory
Information theory
Cryptology
Software Engineering
Computers and Society
Information Systems Applications (incl. Internet)
Logic Design
Coding and Information Theory
ISBN 3-030-25283-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910349309403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui