top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology – EUROCRYPT 2011 [[electronic resource] ] : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings / / edited by Kenneth G. Paterson
Advances in Cryptology – EUROCRYPT 2011 [[electronic resource] ] : 30th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tallinn, Estonia, May 15-19, 2011, Proceedings / / edited by Kenneth G. Paterson
Edizione [1st ed. 2011.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Descrizione fisica 1 online resource (XIV, 628 p. 77 illus., 18 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Computer security
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Systems and Data Security
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-642-20465-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996465389503316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptography and Coding [[electronic resource] ] : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings / / edited by Kenneth G. Paterson
Cryptography and Coding [[electronic resource] ] : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings / / edited by Kenneth G. Paterson
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 390 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer science
Computer communication systems
Computer science—Mathematics
Cryptology
Coding and Information Theory
Computer Science, general
Computer Communication Networks
Discrete Mathematics in Computer Science
ISBN 3-540-40974-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Coding and Applications -- Recent Developments in Array Error-Control Codes -- High Rate Convolutional Codes with Optimal Cycle Weights -- A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes -- Commitment Capacity of Discrete Memoryless Channels -- Separating and Intersecting Properties of BCH and Kasami Codes -- Applications of Coding in Cryptography -- Analysis and Design of Modern Stream Ciphers -- Improved Fast Correlation Attack Using Low Rate Codes -- On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions -- Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class -- Differential Uniformity for Arrays -- Cryptography -- Uses and Abuses of Cryptography -- A Designer’s Guide to KEMs -- A General Construction of IND-CCA2 Secure Public Key Encryption -- Efficient Key Updating Signature Schemes Based on IBS -- Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity -- Cryptanalysis -- Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic -- Resolving Large Prime(s) Variants for Discrete Logarithm Computation -- Computing the M = UU t Integer Matrix Decomposition -- Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups -- More Detail for a Combined Timing and Power Attack against Implementations of RSA -- Predicting the Inversive Generator -- A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002 -- Analysis of Double Block Length Hash Functions -- Network Security and Protocols -- Cryptography in Wireless Standards -- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms -- A General Attack Model on Hash-Based Client Puzzles -- Tripartite Authenticated Key Agreement Protocols from Pairings -- Remote User Authentication Using Public Information -- Mental Poker Revisited.
Record Nr. UNISA-996465794603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Cryptography and Coding [[electronic resource] ] : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings / / edited by Kenneth G. Paterson
Cryptography and Coding [[electronic resource] ] : 9th IMA International Conference, Cirencester, UK, December 16-18, 2003, Proceedings / / edited by Kenneth G. Paterson
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (X, 390 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer science
Computer communication systems
Computer science—Mathematics
Cryptology
Coding and Information Theory
Computer Science, general
Computer Communication Networks
Discrete Mathematics in Computer Science
ISBN 3-540-40974-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Coding and Applications -- Recent Developments in Array Error-Control Codes -- High Rate Convolutional Codes with Optimal Cycle Weights -- A Multifunctional Turbo-Based Receiver Using Partial Unit Memory Codes -- Commitment Capacity of Discrete Memoryless Channels -- Separating and Intersecting Properties of BCH and Kasami Codes -- Applications of Coding in Cryptography -- Analysis and Design of Modern Stream Ciphers -- Improved Fast Correlation Attack Using Low Rate Codes -- On the Covering Radius of Second Order Binary Reed-Muller Code in the Set of Resilient Boolean Functions -- Degree Optimized Resilient Boolean Functions from Maiorana-McFarland Class -- Differential Uniformity for Arrays -- Cryptography -- Uses and Abuses of Cryptography -- A Designer’s Guide to KEMs -- A General Construction of IND-CCA2 Secure Public Key Encryption -- Efficient Key Updating Signature Schemes Based on IBS -- Periodic Sequences with Maximal Linear Complexity and Almost Maximal k-Error Linear Complexity -- Cryptanalysis -- Estimates for Discrete Logarithm Computations in Finite Fields of Small Characteristic -- Resolving Large Prime(s) Variants for Discrete Logarithm Computation -- Computing the M = UU t Integer Matrix Decomposition -- Cryptanalysis of the Public Key Cryptosystem Based on the Word Problem on the Grigorchuk Groups -- More Detail for a Combined Timing and Power Attack against Implementations of RSA -- Predicting the Inversive Generator -- A Stochastical Model and Its Analysis for a Physical Random Number Generator Presented At CHES 2002 -- Analysis of Double Block Length Hash Functions -- Network Security and Protocols -- Cryptography in Wireless Standards -- On the Correctness of Security Proofs for the 3GPP Confidentiality and Integrity Algorithms -- A General Attack Model on Hash-Based Client Puzzles -- Tripartite Authenticated Key Agreement Protocols from Pairings -- Remote User Authentication Using Public Information -- Mental Poker Revisited.
Record Nr. UNINA-9910768166403321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography – SAC 2019 [[electronic resource] ] : 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers / / edited by Kenneth G. Paterson, Douglas Stebila
Selected Areas in Cryptography – SAC 2019 [[electronic resource] ] : 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers / / edited by Kenneth G. Paterson, Douglas Stebila
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XV, 715 p. 323 illus., 66 illus. in color.)
Disciplina 001.5436
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Computer organization
Data structures (Computer science)
Artificial intelligence
Systems and Data Security
Security
Computer Systems Organization and Communication Networks
Data Structures and Information Theory
Artificial Intelligence
ISBN 3-030-38471-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Cipher Modes of Operation and Provable Security -- Looking Back|My Life as a Mathematician and Cryptographer -- Supersingular Isogeny Key Exchange for Beginners -- Probabilistic Mixture Di erential Cryptanalysis on round-reduced AES -- Iterative Differential Characteristic of TRIFLE-BC -- Plaintext Recovery Attacks against XTS Beyond Collisions -- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition -- Algebraic Cryptanalysis of Variants of Frit -- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree -- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules -- Towards a Practical Cluster Analysis over Encrypted Data -- Breaking the Bluetooth Pairing { The Fixed Coordinate Invalid Curve Attack -- Using TopGear in Overdrive: A more e cient ZKPoK for SPDZ -- On the Real-World Instantiability of Admissible Hash Functions and Effcient Verifiable Random Functions -- Tight Security Bounds for Generic Stream Cipher Constructions -- On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet -- A Lightweight Alternative to PMAC -- An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks -- Ternary Syndrome Decoding with Large Weight -- Exploring Trade-o s in Batch Bounded Distance Decoding -- On Quantum Slide Attacks -- XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V 1 -- A timing attack on the HQC encryption scheme -- Block-Anti-Circulant Unbalanced Oil and Vinegar -- A DFA Attack on White-Box Implementations of AES with External Encodings -- Parallelizable Authenticated Encryption with Small State Size -- Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery -- BBQ: Using AES in Picnic Signatures -- Towards practical GGM-based PRF from (Module-)Learning-with Rounding.
Record Nr. UNISA-996418284503316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography – SAC 2019 : 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers / / edited by Kenneth G. Paterson, Douglas Stebila
Selected Areas in Cryptography – SAC 2019 : 26th International Conference, Waterloo, ON, Canada, August 12–16, 2019, Revised Selected Papers / / edited by Kenneth G. Paterson, Douglas Stebila
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Descrizione fisica 1 online resource (XV, 715 p. 323 illus., 66 illus. in color.)
Disciplina 001.5436
Collana Security and Cryptology
Soggetto topico Computer security
Data protection
Computer organization
Data structures (Computer science)
Artificial intelligence
Systems and Data Security
Security
Computer Systems Organization and Communication Networks
Data Structures and Information Theory
Artificial Intelligence
ISBN 3-030-38471-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Block Cipher Modes of Operation and Provable Security -- Looking Back|My Life as a Mathematician and Cryptographer -- Supersingular Isogeny Key Exchange for Beginners -- Probabilistic Mixture Di erential Cryptanalysis on round-reduced AES -- Iterative Differential Characteristic of TRIFLE-BC -- Plaintext Recovery Attacks against XTS Beyond Collisions -- Cryptanalysis of SKINNY in the Framework of the SKINNY 2018-2019 Cryptanalysis Competition -- Algebraic Cryptanalysis of Variants of Frit -- Improved Interpolation Attacks on Cryptographic Primitives of Low Algebraic Degree -- A General Framework for the Related-key Linear Attack against Block Ciphers with Linear Key Schedules -- Towards a Practical Cluster Analysis over Encrypted Data -- Breaking the Bluetooth Pairing { The Fixed Coordinate Invalid Curve Attack -- Using TopGear in Overdrive: A more e cient ZKPoK for SPDZ -- On the Real-World Instantiability of Admissible Hash Functions and Effcient Verifiable Random Functions -- Tight Security Bounds for Generic Stream Cipher Constructions -- On the Data Limitation of Small-State Stream Ciphers: Correlation Attacks on Fruit-80 and Plantlet -- A Lightweight Alternative to PMAC -- An Improved Security Analysis on an Indeterminate Equation Public Key Cryptosystem by Evaluation Attacks -- Ternary Syndrome Decoding with Large Weight -- Exploring Trade-o s in Batch Bounded Distance Decoding -- On Quantum Slide Attacks -- XMSS and Embedded Systems: XMSS Hardware Accelerators for RISC-V 1 -- A timing attack on the HQC encryption scheme -- Block-Anti-Circulant Unbalanced Oil and Vinegar -- A DFA Attack on White-Box Implementations of AES with External Encodings -- Parallelizable Authenticated Encryption with Small State Size -- Deep Neural Network Attribution Methods for Leakage Analysis and Symmetric Key Recovery -- BBQ: Using AES in Picnic Signatures -- Towards practical GGM-based PRF from (Module-)Learning-with Rounding.
Record Nr. UNINA-9910373938503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2020
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui