top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Progress in Cryptology - INDOCRYPT 2012 [[electronic resource] ] : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, Proceedings / / edited by Steven Galbraith, Mridul Nandi
Progress in Cryptology - INDOCRYPT 2012 [[electronic resource] ] : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, Proceedings / / edited by Steven Galbraith, Mridul Nandi
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (XIV, 566 p. 118 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Algorithms
Management information systems
Computer science
Computer security
Computer science—Mathematics
Cryptology
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
Systems and Data Security
Discrete Mathematics in Computer Science
ISBN 3-642-34931-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto How to Compute on Encrypted Data -- Using the Cloud to Determine Key Strengths -- On the Non-malleability of the Fiat-Shamir Transform -- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 -- Leakage Squeezing of Order Two -- Hash Functions and Stream Cipher -- Collision Attack on the Hamsi-256 Compression Function -- Generalized Iterated Hash Functions Revisited: New Complexity Bounds for Multicollision Attacks -- A Di_erential Fault Attack on the Grain Family under Reasonable Assumptions -- Faster Chosen-Key Distinguishers on Reduced-Round AES -- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System -- Computing Small Discrete Logarithms Faster -- Embedded Syndrome-Based Hashing -- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA -- A New Model of Binary Elliptic Curves -- Symmetric Key Design and Provable Security SipHash: a fast short-input PRF.
Record Nr. UNISA-996466296803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 237 p. 106 illus., 42 illus. in color.)
Disciplina 005.82
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Software engineering
Computers
Computer engineering
Computer networks
Data and Information Security
Software Engineering
Computer Hardware
Computer Engineering and Networks
ISBN 3-030-35869-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Record Nr. UNISA-996466288103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (X, 237 p. 106 illus., 42 illus. in color.)
Disciplina 005.82
Collana Theoretical Computer Science and General Issues
Soggetto topico Data protection
Software engineering
Computers
Computer engineering
Computer networks
Data and Information Security
Software Engineering
Computer Hardware
Computer Engineering and Networks
ISBN 3-030-35869-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations.
Record Nr. UNINA-9910357845403321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Status report on the first round of the SHA-3 cryptographic hash algorithm competition / / Andrew Regenscheid; Ray Perlner; Shu-jen Chang; John Kelsey; Mridul Nandi; Souradyuti Paul
Status report on the first round of the SHA-3 cryptographic hash algorithm competition / / Andrew Regenscheid; Ray Perlner; Shu-jen Chang; John Kelsey; Mridul Nandi; Souradyuti Paul
Autore Regenscheid Andrew
Pubbl/distr/stampa Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2009
Descrizione fisica 1 online resource
Altri autori (Persone) ZhangShuoren
KelseyJohn
NandiMridul
PaulSouradyuti
PerlnerRay
RegenscheidAndrew
Collana NISTIR
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910710749703321
Regenscheid Andrew  
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui