Advances in Cryptology – EUROCRYPT 2011 [[electronic resource] ] : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings / / edited by Kenneth G. Paterson |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIV, 628 p. 77 illus., 18 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Algorithms Computer science—Mathematics Management information systems Computer science Cryptology Computer Communication Networks Systems and Data Security Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Management of Computing and Information Systems |
ISBN | 3-642-20465-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465389503316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptography and Coding [[electronic resource] ] : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings / / edited by Kenneth G. Paterson |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (X, 390 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Coding theory Information theory Computer science Computer communication systems Computer science—Mathematics Cryptology Coding and Information Theory Computer Science, general Computer Communication Networks Discrete Mathematics in Computer Science |
ISBN | 3-540-40974-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Coding and Applications -- Recent Developments in Array Error-Control Codes -- High Rate Convolutional Codes with Optimal Cycle Weights -- A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes -- Commitment Capacity of Discrete Memoryless Channels -- Separating and Intersecting Properties of BCH and Kasami Codes -- Applications of Coding in Cryptography -- Analysis and Design of Modern Stream Ciphers -- Improved Fast Correlation Attack Using Low Rate Codes -- On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions -- Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class -- Differential Uniformity for Arrays -- Cryptography -- Uses and Abuses of Cryptography -- A Designer’s Guide to KEMs -- A General Construction of IND-CCA2 Secure Public Key Encryption -- Efficient Key Updating Signature Schemes Based on IBS -- Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity -- Cryptanalysis -- Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic -- Resolving Large Prime(s) Variants for Discrete Logarithm Computation -- Computing the M = UU t Integer Matrix Decomposition -- Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups -- More Detail for a Combined Timing and Power Attack against Implementations of RSA -- Predicting the Inversive Generator -- A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002 -- Analysis of Double Block Length Hash Functions -- Network Security and Protocols -- Cryptography in Wireless Standards -- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms -- A General Attack Model on Hash-Based Client Puzzles -- Tripartite Authenticated Key Agreement Protocols from Pairings -- Remote User Authentication Using Public Information -- Mental Poker Revisited. |
Record Nr. | UNISA-996465794603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptography and Coding : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings / / edited by Kenneth G. Paterson |
Edizione | [1st ed. 2003.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 |
Descrizione fisica | 1 online resource (X, 390 p.) |
Disciplina | 005.8/2 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Coding theory Information theory Computer science Computer networks Computer science—Mathematics Cryptology Coding and Information Theory Computer Science, general Computer Communication Networks Discrete Mathematics in Computer Science |
ISBN | 3-540-40974-2 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Coding and Applications -- Recent Developments in Array Error-Control Codes -- High Rate Convolutional Codes with Optimal Cycle Weights -- A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes -- Commitment Capacity of Discrete Memoryless Channels -- Separating and Intersecting Properties of BCH and Kasami Codes -- Applications of Coding in Cryptography -- Analysis and Design of Modern Stream Ciphers -- Improved Fast Correlation Attack Using Low Rate Codes -- On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions -- Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class -- Differential Uniformity for Arrays -- Cryptography -- Uses and Abuses of Cryptography -- A Designer’s Guide to KEMs -- A General Construction of IND-CCA2 Secure Public Key Encryption -- Efficient Key Updating Signature Schemes Based on IBS -- Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity -- Cryptanalysis -- Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic -- Resolving Large Prime(s) Variants for Discrete Logarithm Computation -- Computing the M = UU t Integer Matrix Decomposition -- Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups -- More Detail for a Combined Timing and Power Attack against Implementations of RSA -- Predicting the Inversive Generator -- A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002 -- Analysis of Double Block Length Hash Functions -- Network Security and Protocols -- Cryptography in Wireless Standards -- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms -- A General Attack Model on Hash-Based Client Puzzles -- Tripartite Authenticated Key Agreement Protocols from Pairings -- Remote User Authentication Using Public Information -- Mental Poker Revisited. |
Record Nr. | UNINA-9910768166403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Selected Areas in Cryptography – SAC 2019 [[electronic resource] ] : 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers / / edited by Kenneth G. Paterson, Douglas Stebila |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XV, 715 p. 323 illus., 66 illus. in color.) |
Disciplina | 001.5436 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Computer organization Data structures (Computer science) Artificial intelligence Systems and Data Security Security Computer Systems Organization and Communication Networks Data Structures and Information Theory Artificial Intelligence |
ISBN | 3-030-38471-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Cipher Modes of Operation and Provable Security -- Looking Back|My Life as a Mathematician and Cryptographer -- Supersingular Isogeny Key Exchange for Beginners -- Probabilistic Mixture Di erential Cryptanalysis on round-reduced AES -- Iterative Differential Characteristic of TRIFLE-BC -- Plaintext Recovery Attacks against XTS Beyond Collisions -- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition -- Algebraic Cryptanalysis of Variants of Frit -- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree -- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules -- Towards a Practical Cluster Analysis over Encrypted Data -- Breaking the Bluetooth Pairing { The Fixed Coordinate Invalid Curve Attack -- Using TopGear in Overdrive: A more e cient ZKPoK for SPDZ -- On the Real-World Instantiability of Admissible Hash Functions and Effcient Verifiable Random Functions -- Tight Security Bounds for Generic Stream Cipher Constructions -- On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet -- A Lightweight Alternative to PMAC -- An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks -- Ternary Syndrome Decoding with Large Weight -- Exploring Trade-o s in Batch Bounded Distance Decoding -- On Quantum Slide Attacks -- XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V 1 -- A timing attack on the HQC encryption scheme -- Block-Anti-Circulant Unbalanced Oil and Vinegar -- A DFA Attack on White-Box Implementations of AES with External Encodings -- Parallelizable Authenticated Encryption with Small State Size -- Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery -- BBQ: Using AES in Picnic Signatures -- Towards practical GGM-based PRF from (Module-)Learning-with Rounding. |
Record Nr. | UNISA-996418284503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Selected Areas in Cryptography – SAC 2019 : 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers / / edited by Kenneth G. Paterson, Douglas Stebila |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 |
Descrizione fisica | 1 online resource (XV, 715 p. 323 illus., 66 illus. in color.) |
Disciplina | 001.5436 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data protection Computer organization Data structures (Computer science) Artificial intelligence Systems and Data Security Security Computer Systems Organization and Communication Networks Data Structures and Information Theory Artificial Intelligence |
ISBN | 3-030-38471-3 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Block Cipher Modes of Operation and Provable Security -- Looking Back|My Life as a Mathematician and Cryptographer -- Supersingular Isogeny Key Exchange for Beginners -- Probabilistic Mixture Di erential Cryptanalysis on round-reduced AES -- Iterative Differential Characteristic of TRIFLE-BC -- Plaintext Recovery Attacks against XTS Beyond Collisions -- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition -- Algebraic Cryptanalysis of Variants of Frit -- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree -- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules -- Towards a Practical Cluster Analysis over Encrypted Data -- Breaking the Bluetooth Pairing { The Fixed Coordinate Invalid Curve Attack -- Using TopGear in Overdrive: A more e cient ZKPoK for SPDZ -- On the Real-World Instantiability of Admissible Hash Functions and Effcient Verifiable Random Functions -- Tight Security Bounds for Generic Stream Cipher Constructions -- On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet -- A Lightweight Alternative to PMAC -- An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks -- Ternary Syndrome Decoding with Large Weight -- Exploring Trade-o s in Batch Bounded Distance Decoding -- On Quantum Slide Attacks -- XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V 1 -- A timing attack on the HQC encryption scheme -- Block-Anti-Circulant Unbalanced Oil and Vinegar -- A DFA Attack on White-Box Implementations of AES with External Encodings -- Parallelizable Authenticated Encryption with Small State Size -- Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery -- BBQ: Using AES in Picnic Signatures -- Towards practical GGM-based PRF from (Module-)Learning-with Rounding. |
Record Nr. | UNINA-9910373938503321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|