top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security Technology for Applications [[electronic resource] ] : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers / / edited by Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg
Information Security Technology for Applications [[electronic resource] ] : 15th Nordic Conference on Secure IT Systems, NordSec 2010, Espoo, Finland, October 27-29, 2010, Revised Selected Papers / / edited by Tuomas Aura, Kimmo Järvinen, Kaisa Nyberg
Edizione [1st ed. 2012.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Descrizione fisica 1 online resource (X, 289 p. 73 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data structures (Computer science)
Coding theory
Information theory
Data encryption (Computer science)
Application software
E-commerce
Systems and Data Security
Data Structures and Information Theory
Coding and Information Theory
Cryptology
Information Systems Applications (incl. Internet)
e-Commerce/e-business
ISBN 3-642-27937-6
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465685703316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography [[electronic resource] ] : 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers / / edited by Kaisa Nyberg, Howard Heys
Selected Areas in Cryptography [[electronic resource] ] : 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers / / edited by Kaisa Nyberg, Howard Heys
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 412 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Cryptology
Science, Humanities and Social Sciences, multidisciplinary
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-36492-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Elliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.
Record Nr. UNISA-996465649503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography : 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers / / edited by Kaisa Nyberg, Howard Heys
Selected Areas in Cryptography : 9th Annual International Workshop, SAC 2002, St. John's, Newfoundland, Canada, August 15-16, 2002, Revised Papers / / edited by Kaisa Nyberg, Howard Heys
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 412 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Management information systems
Computer science
Cryptology
Science, Humanities and Social Sciences, multidisciplinary
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-36492-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Elliptic Curve Enhancements -- Modifications of ECDSA -- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves -- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves -- SNOW -- Guess-and-Determine Attacks on SNOW -- A New Version of the Stream Cipher SNOW -- Encryption Schemes -- Encryption-Scheme Security in the Presence of Key-Dependent Messages -- On the Security of CTR + CBC-MAC -- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing -- Differential Attacks -- Markov Truncated Differential Cryptanalysis of Skipjack -- Higher Order Differential Attack of Camellia(II) -- Square-like Attacks on Reduced Rounds of IDEA -- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98 -- Boolean Functions and Stream Ciphers -- On Propagation Characteristics of Resilient Functions -- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q) -- Multiples of Primitive Polynomials and Their Products over GF(2) -- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function -- Block Cipher Security -- White-Box Cryptography and an AES Implementation -- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive -- Signatures and Secret Sharing -- New Results on Unconditionally Secure Distributed Oblivious Transfer -- Efficient Identity Based Signature Schemes Based on Pairings -- The Group Diffie-Hellman Problems -- MAC and Hash Constructions -- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model -- An Efficient MAC for Short Messages -- RSA and XTR Enhancements -- Optimal Extension Fields for XTR -- On Some Attacks on Multi-prime RSA.
Record Nr. UNINA-9910143880803321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Topics in Cryptology –- CT-RSA 2015 [[electronic resource] ] : The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings / / edited by Kaisa Nyberg
Topics in Cryptology –- CT-RSA 2015 [[electronic resource] ] : The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings / / edited by Kaisa Nyberg
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 508 p. 79 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Coding theory
Information theory
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
ISBN 3-319-16715-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Timing Attacks -- Just A Little Bit More -- Cache Storage Attacks -- Design and Analysis of Block Ciphers -- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows -- Improved Attacks on Reduced-Round Camellia-128/192/256 -- Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings -- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts -- Membership -- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives -- Non-Interactive Zero-Knowledge Proofs of Non-Membership -- Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8 -- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON -- Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption -- Format Oracles on OpenPGP -- Algorithms for Solving Hard Problems -- Finding Shortest Lattice Vectors in the Presence of Gaps -- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints -- Constructions of Hash Functions and Message Authentication Codes -- Hash Functions from Defective Ideal Ciphers -- Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication -- Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers -- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party -- Computation -- Authenticated Encryption -- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption -- Cryptanalysis of Ascon -- Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions -- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption -- Implementation Attacks on Exponentiation Algorithms -- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace -- Cold Boot Attacks in the Discrete Logarithm Setting -- Homomorphic Encryption and Its Applications -- Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
Record Nr. UNISA-996200343803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Topics in Cryptology –- CT-RSA 2015 : The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings / / edited by Kaisa Nyberg
Topics in Cryptology –- CT-RSA 2015 : The Cryptographer's Track at the RSA Conference 2015, San Francisco, CA, USA, April 20-24, 2015. Proceedings / / edited by Kaisa Nyberg
Edizione [1st ed. 2015.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Descrizione fisica 1 online resource (XIII, 508 p. 79 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer security
Computer communication systems
Coding theory
Information theory
Cryptology
Systems and Data Security
Computer Communication Networks
Coding and Information Theory
ISBN 3-319-16715-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Timing Attacks -- Just A Little Bit More -- Cache Storage Attacks -- Design and Analysis of Block Ciphers -- Analyzing Permutations for AES-like Ciphers: Understanding ShiftRows -- Improved Attacks on Reduced-Round Camellia-128/192/256 -- Attribute and Identity Based Encryption Duality in ABE: Converting Attribute Based Encryption for Dual Predicate and Dual Policy via Computational Encodings -- Revocable Hierarchical Identity-Based Encryption: History-Free Update, Security Against Insiders, and Short Ciphertexts -- Membership -- Revisiting Cryptographic Accumulators, Additional Properties and Relations to other Primitives -- Non-Interactive Zero-Knowledge Proofs of Non-Membership -- Secure and Efficient Implementation of AES Based Cryptosystems Implementing GCM on ARMv8 -- Higher-Order Masking in Practice: A Vector Implementation of Masked AES for ARM NEON -- Chosen Ciphertext Attacks in Theory and Practice Completeness of Single-Bit Projection-KDM Security for Public Key Encryption -- Format Oracles on OpenPGP -- Algorithms for Solving Hard Problems -- Finding Shortest Lattice Vectors in the Presence of Gaps -- A Simple and Improved Algorithm for Integer Factorization with Implicit Hints -- Constructions of Hash Functions and Message Authentication Codes -- Hash Functions from Defective Ideal Ciphers -- Using an Error-Correction Code for Fast, Beyond-birthday-bound Authentication -- Secure Multiparty Computation.-Efficient Leakage Resilient Circuit Compilers -- Optimally Efficient Multi-Party Fair Exchange and Fair Secure Multi-Party -- Computation -- Authenticated Encryption -- How to Incorporate Associated Data in Sponge-Based Authenticated Encryption -- Cryptanalysis of Ascon -- Detecting and Tracing Malicious Activities Stronger Security Notions for Decentralized Traceable Attribute-Based Signatures and More Efficient Constructions -- Re-encryption Verifiability: How to Detect Malicious Activities of a Proxy in Proxy Re-encryption -- Implementation Attacks on Exponentiation Algorithms -- Exploiting Collisions in Addition Chain-based Exponentiation Algorithms Using a Single Trace -- Cold Boot Attacks in the Discrete Logarithm Setting -- Homomorphic Encryption and Its Applications -- Communication Optimal Tardos-based Asymmetric Fingerprinting. Linearly Homomorphic Encryption from DDH.
Record Nr. UNINA-9910484287003321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2015
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui