Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings / / Josef Pieprzyk, Reihanah Safavi-Naini, eds |
Pubbl/distr/stampa | Springer Berlin Heidelberg |
Disciplina | 005.8/2 |
Altri autori (Persone) |
Safavi-NainiReihanah
PieprzykJosef |
Soggetto topico |
Computer security - Congresses
Cryptography - Congresses |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Altri titoli varianti | Advances in Cryptology — ASIACRYPT'94 |
Record Nr. | UNISA-996466116503316 |
Springer Berlin Heidelberg | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings / / Josef Pieprzyk (editor) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (XIV, 572 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-540-89255-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multi-Party Computation -- MPC vs. SFE : Unconditional and Computational Security -- Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes -- Graph Design for Secure Multiparty Computation over Non-Abelian Groups -- Invited Talk -- Some Perspectives on Complexity-Based Cryptography -- Cryptographic Protocols I -- A Modular Security Analysis of the TLS Handshake Protocol -- Ambiguous Optimistic Fair Exchange -- Compact Proofs of Retrievability -- On the Security of HB# against a Man-in-the-Middle Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH -- Slide Attacks on a Class of Hash Functions -- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography -- Cryptographic Protocols II -- Universally Composable Adaptive Oblivious Transfer -- A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting -- Towards Robust Computation on Encrypted Data -- Efficient Protocols for Set Membership and Range Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How to Fill Up Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key Cryptography I -- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption -- Twisted Edwards Curves Revisited -- On the Validity of the ?-Hiding Assumption in Cryptographic Protocols -- Chosen Ciphertext Security with Optimal Ciphertext Overhead -- Lattice-Based Cryptography -- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems -- Rigorous and Efficient Short Lattice Vectors Enumeration -- Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits -- Private-Key Cryptography -- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity -- An Improved Impossible Differential Attack on MISTY1 -- Public-Key Cryptography II -- Generalized Identity Based and Broadcast Encryption Schemes -- Speeding Up the Pollard Rho Method on Prime Fields -- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems -- OAEP Is Secure under Key-Dependent Messages -- Analysis of Stream Ciphers -- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks -- A New Attack on the LEX Stream Cipher -- Breaking the F-FCSR-H Stream Cipher in Real Time. |
Record Nr. | UNINA-9910484704403321 |
Berlin, Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in cryptology, ASIACRYPT 2008 : 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7-11, 2008, proceedings / / Josef Pieprzyk (editor) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer-Verlag, , [2008] |
Descrizione fisica | 1 online resource (XIV, 572 p.) |
Disciplina | 005.82 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer security |
ISBN | 3-540-89255-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multi-Party Computation -- MPC vs. SFE : Unconditional and Computational Security -- Strongly Multiplicative and 3-Multiplicative Linear Secret Sharing Schemes -- Graph Design for Secure Multiparty Computation over Non-Abelian Groups -- Invited Talk -- Some Perspectives on Complexity-Based Cryptography -- Cryptographic Protocols I -- A Modular Security Analysis of the TLS Handshake Protocol -- Ambiguous Optimistic Fair Exchange -- Compact Proofs of Retrievability -- On the Security of HB# against a Man-in-the-Middle Attack -- Cryptographic Hash Functions I -- Hash Functions from Sigma Protocols and Improvements to VSH -- Slide Attacks on a Class of Hash Functions -- Basing PRFs on Constant-Query Weak PRFs: Minimizing Assumptions for Efficient Symmetric Cryptography -- Cryptographic Protocols II -- Universally Composable Adaptive Oblivious Transfer -- A Linked-List Approach to Cryptographically Secure Elections Using Instant Runoff Voting -- Towards Robust Computation on Encrypted Data -- Efficient Protocols for Set Membership and Range Proofs -- Cryptographic Hash Functions II -- Preimage Attacks on 3, 4, and 5-Pass HAVAL -- How to Fill Up Merkle-Damgård Hash Functions -- Limits of Constructive Security Proofs -- Public-Key Cryptography I -- Efficient Chosen Ciphertext Secure Public Key Encryption under the Computational Diffie-Hellman Assumption -- Twisted Edwards Curves Revisited -- On the Validity of the ?-Hiding Assumption in Cryptographic Protocols -- Chosen Ciphertext Security with Optimal Ciphertext Overhead -- Lattice-Based Cryptography -- Concurrently Secure Identification Schemes Based on the Worst-Case Hardness of Lattice Problems -- Rigorous and Efficient Short Lattice Vectors Enumeration -- Solving Linear Equations Modulo Divisors: On Factoring Given Any Bits -- Private-Key Cryptography -- An Infinite Class of Balanced Functions with Optimal Algebraic Immunity, Good Immunity to Fast Algebraic Attacks and Good Nonlinearity -- An Improved Impossible Differential Attack on MISTY1 -- Public-Key Cryptography II -- Generalized Identity Based and Broadcast Encryption Schemes -- Speeding Up the Pollard Rho Method on Prime Fields -- Sufficient Conditions for Intractability over Black-Box Groups: Generic Lower Bounds for Generalized DL and DH Problems -- OAEP Is Secure under Key-Dependent Messages -- Analysis of Stream Ciphers -- Cryptanalysis of Sosemanuk and SNOW 2.0 Using Linear Masks -- A New Attack on the LEX Stream Cipher -- Breaking the F-FCSR-H Stream Cipher in Real Time. |
Record Nr. | UNISA-996465527903316 |
Berlin, Heidelberg : , : Springer-Verlag, , [2008] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Advances in cryptology--AUSCRYPT '90 : international conference on cryptology, Sydney, Australia, January 8-11, 1990 : proceedings / / J. Seberry, J. Pieprzyk, eds |
Pubbl/distr/stampa | Springer Berlin Heidelberg |
Disciplina | 005.8/2 |
Altri autori (Persone) |
SeberryJennifer
PieprzykJosef |
Soggetto topico |
Computer security - Congresses
Cryptography - Congresses |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465865003316 |
Springer Berlin Heidelberg | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and Network Security [[electronic resource] ] : 11th International Conference, CANS 2012, Darmstadt, Germany, December 12-14, 2012. Proceedings / / edited by Josef Pieprzyk, Ahmad-Reza Sadeghi, Mark Manulis |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XVI, 311 p. 48 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer science—Mathematics Coding theory Information theory Data structures (Computer science) Computer security Cryptology Computer Communication Networks Discrete Mathematics in Computer Science Coding and Information Theory Data Structures and Information Theory Systems and Data Security |
ISBN | 3-642-35404-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- Network security -- Cryptographic protocols -- Encryption -- S-box theory. |
Record Nr. | UNISA-996465945703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security [[electronic resource] ] : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry |
Edizione | [1st ed. 2000.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 |
Descrizione fisica | 1 online resource (X, 322 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Algorithms Operating systems (Computers) Management information systems Computer science Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Operating Systems Management of Computing and Information Systems |
ISBN | 3-540-44456-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization. |
Record Nr. | UNISA-996466008803316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security : Third International Workshop, ISW 2000, Wollongong, Australia, December 20-21, 2000. Proceedings / / edited by Josef Pieprzyk, Eiji Okamoto, Jennifer Seberry |
Edizione | [1st ed. 2000.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 |
Descrizione fisica | 1 online resource (X, 322 p.) |
Disciplina | 005.8 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Data encryption (Computer science)
Computer networks Algorithms Operating systems (Computers) Management information systems Computer science Cryptology Computer Communication Networks Algorithm Analysis and Problem Complexity Operating Systems Management of Computing and Information Systems |
ISBN | 3-540-44456-4 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Multimedia Copyright Protection -- A Watermarking Scheme Based on the Characteristic of Addition among DCT Coefficients -- Affine Invariant Watermarks for 3D Polygonal and NURBS Based Models -- A Steganographic Framework for Reference Colour Based Encoding and Cover Image Selection -- Spatial-Domain Image Watermarking Robust against Compression, Filtering, Cropping, and Scaling -- Region-Based Watermarking by Distribution Adjustment -- Hiding Information in Color Images Using Small Color Palettes -- An Approach to the Objective and Quantitative Evaluation of Tamper-Resistant Software -- Characteristics of Some Binary Codes for Fingerprinting -- E-Commerce -- An Anonymous Auction Protocol with a Single Non-trusted Center Using Binary Trees -- Unlinkable Divisible Electronic Cash -- Weighted One-Way Hash Chain and Its Applications -- Linkability in Practical Electronic Cash Design -- Towards a Practical Secure Framework for Mobile Code Commerce -- Key Management -- Probabilistic Methods in Multicast Key Management -- Classification of Authentication Protocols: A Practical Approach -- Exploring Fair Exchange Protocols Using Specification Animation -- A Practical Implementation of Hierarchically Structured Key Predistribution System and Its Evaluation -- Network Security and Access Control -- An Efficient Protocol for Certified Electronic Mail -- Performance Analysis of Secure Web Server Based on SSL -- Sherlock: Commercial High Assurance Network Computing Extended Abstract -- The Role of the Development Process in Operating System Security -- Cryptographic Systems -- Threshold Fail-Stop Signature Schemes Based on Discrete Logarithm and Factorization -- A Signcryption Scheme Based on Integer Factorization. |
Record Nr. | UNINA-9910143608103321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Information Security and Privacy [[electronic resource] ] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II / / edited by Josef Pieprzyk, Suriadi Suriadi |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVII, 471 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-319-59870-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography. |
Record Nr. | UNISA-996466283403316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Privacy [[electronic resource] ] : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I / / edited by Josef Pieprzyk, Suriadi Suriadi |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XXIX, 471 p. 75 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-319-60055-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography. |
Record Nr. | UNISA-996466289903316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Information Security and Privacy : 22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part II / / edited by Josef Pieprzyk, Suriadi Suriadi |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XVII, 471 p. 93 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Management information systems Computer science Algorithms Computers and civilization Systems and Data Security Cryptology Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computers and Society |
ISBN | 3-319-59870-8 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public key encryption -- Attribute-based encryption -- Identity-based encryption -- Searchable encryption -- Cryptanalysis -- Digital signatures -- Symmetric cryptography -- Software security -- Network security -- Malware detection -- Privacy -- Authentication -- Elliptic curve cryptography. |
Record Nr. | UNINA-9910483788303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|