Progress in Cryptology - INDOCRYPT 2012 [[electronic resource] ] : 12th International Conference on Cryptology in India, Chennai, India, December 11-14, 2011, Proceedings13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, Proceedings / / edited by Steven Galbraith, Mridul Nandi |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIV, 566 p. 118 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Management information systems Computer science Computer security Computer science—Mathematics Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Management of Computing and Information Systems Systems and Data Security Discrete Mathematics in Computer Science |
ISBN | 3-642-34931-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | How to Compute on Encrypted Data -- Using the Cloud to Determine Key Strengths -- On the Non-malleability of the Fiat-Shamir Transform -- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 -- Leakage Squeezing of Order Two -- Hash Functions and Stream Cipher -- Collision Attack on the Hamsi-256 Compression Function -- Generalized Iterated Hash Functions Revisited: New Complexity Bounds for Multicollision Attacks -- A Di_erential Fault Attack on the Grain Family under Reasonable Assumptions -- Faster Chosen-Key Distinguishers on Reduced-Round AES -- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System -- Computing Small Discrete Logarithms Faster -- Embedded Syndrome-Based Hashing -- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA -- A New Model of Binary Elliptic Curves -- Symmetric Key Design and Provable Security SipHash: a fast short-input PRF. |
Record Nr. | UNISA-996466296803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Applied Cryptography Engineering [[electronic resource] ] : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 237 p. 106 illus., 42 illus. in color.) |
Disciplina | 005.82 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Data protection
Software engineering Computers Computer engineering Computer networks Data and Information Security Software Engineering Computer Hardware Computer Engineering and Networks |
ISBN | 3-030-35869-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. |
Record Nr. | UNISA-996466288103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Security, Privacy, and Applied Cryptography Engineering : 9th International Conference, SPACE 2019, Gandhinagar, India, December 3–7, 2019, Proceedings / / edited by Shivam Bhasin, Avi Mendelson, Mridul Nandi |
Edizione | [1st ed. 2019.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 |
Descrizione fisica | 1 online resource (X, 237 p. 106 illus., 42 illus. in color.) |
Disciplina | 005.82 |
Collana | Theoretical Computer Science and General Issues |
Soggetto topico |
Data protection
Software engineering Computers Computer engineering Computer networks Data and Information Security Software Engineering Computer Hardware Computer Engineering and Networks |
ISBN | 3-030-35869-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Deployment of EMC-Compliant IC Chip Techniques in Design for Hardware Security -- Real Processing-in-Memory with Memristive Memory Processing Unit -- Length Preserving Symmetric Encryption: Is it Important? -- Towards Automatic Application of Side Channel Countermeasures -- Challenges in Deep Learning-based Profiled Side-channel Analysis -- A Study of Persistent Fault Analysis -- Internal state recovery attack on Stream Ciphers : Breaking BIVIUM -- Related-key Differential Cryptanalysis of Full Round CRAFT -- SpookChain: Chaining a Sponge-Based AEAD with Beyond-Birthday Security -- One trace is all it takes: Machine Learning-based Side-channel Attack on EdDSA -- An Efficient Practical Implementation of Impossible-Differentia Cryptanalysis for Five-Round AES-128 -- Automated Classification of Web-Application Attacks for Intrusion Detection -- Formal Analysis of PUF Instances Leveraging Correlation-Spectra in Boolean Functions -- ProTro: A Probabilistic Counter based Hardware Trojan Attack on FPGA based MACSec enabled Ethernet Switch -- Encrypted Classification Using Secure K-Nearest Neighbour Computation -- A Few Negative Results on Constructions of MDS Matrices Using Low XOR Matrices -- Revisiting the Security of LPN based RFID Authentication Protocol and Potential Exploits in Hardware Implementations. |
Record Nr. | UNINA-9910357845403321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Status report on the first round of the SHA-3 cryptographic hash algorithm competition / / Andrew Regenscheid; Ray Perlner; Shu-jen Chang; John Kelsey; Mridul Nandi; Souradyuti Paul |
Autore | Regenscheid Andrew |
Pubbl/distr/stampa | Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2009 |
Descrizione fisica | 1 online resource |
Altri autori (Persone) |
ZhangShuoren
KelseyJohn NandiMridul PaulSouradyuti PerlnerRay RegenscheidAndrew |
Collana | NISTIR |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNINA-9910710749703321 |
Regenscheid Andrew | ||
Gaithersburg, MD : , : U.S. Dept. of Commerce, National Institute of Standards and Technology, , 2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|