Advances in Cryptology – EUROCRYPT 2012 [[electronic resource] ] : 31st Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cambridge, UK, April 15-19, 2012, Proceedings / / edited by David Pointcheval, Thomas Johansson |
Edizione | [1st ed. 2012.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 |
Descrizione fisica | 1 online resource (XIV, 758 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Algorithms Computer science—Mathematics Management information systems Computer science Cryptology Computer Communication Networks Systems and Data Security Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Management of Computing and Information Systems |
ISBN | 3-642-29011-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465990403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2012 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security [[electronic resource] ] : 7th International Conference, ACNS 2009, Paris-Rocquencourt, France, June 2-5, 2009, Proceedings / / edited by Michel Abdalla, David Pointcheval, Pierre-Alain Fouque, Damien Vergnaud |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 |
Descrizione fisica | 1 online resource (XIII, 535 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Computer security Application software Coding theory Information theory Data structures (Computer science) Cryptology Computer Communication Networks Systems and Data Security Information Systems Applications (incl. Internet) Coding and Information Theory Data Structures and Information Theory |
ISBN | 3-642-01957-9 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key Exchange -- Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys -- Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange Protocol -- Secure Pairing of “Interface-Constrained” Devices Resistant against Rushing User Behavior -- How to Extract and Expand Randomness: A Summary and Explanation of Existing Results -- Secure Computation -- Novel Precomputation Schemes for Elliptic Curve Cryptosystems -- Practical Secure Evaluation of Semi-private Functions -- Secure Hamming Distance Based Computation and Its Applications -- Efficient Robust Private Set Intersection -- Public-Key Encryption -- A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext Attack -- An Efficient Identity-Based Online/Offline Encryption Scheme -- Dual-Policy Attribute Based Encryption -- Construction of Threshold Public-Key Encryptions through Tag-Based Encryptions -- Network Security I -- Malyzer: Defeating Anti-detection for Application-Level Malware Analysis -- A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive Networks -- Traitor Tracing -- Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext Size -- Tracing and Revoking Pirate Rebroadcasts -- Authentication and Anonymity -- Efficient Deniable Authentication for Signatures -- Homomorphic MACs: MAC-Based Integrity for Network Coding -- Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PIN -- Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks -- Hash Functions -- Cryptanalysis of Twister -- Cryptanalysis of CubeHash -- Collision Attack on Boole -- Network Security II -- Integrity Protection for Revision Control -- Fragility of the Robust Security Network: 802.11 Denial of Service -- Fast Packet Classification Using Condition Factorization -- Lattices -- Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM Approaches -- Broadcast Attacks against Lattice-Based Cryptosystems -- Partial Key Exposure Attack on CRT-RSA -- Side-Channel Attacks -- How to Compare Profiled Side-Channel Attacks? -- Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis -- Attacking ECDSA-Enabled RFID Devices. |
Record Nr. | UNISA-996465979303316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Asymmetric cryptography : primitives and protocols / / coordinated by David Pointcheval |
Edizione | [[First edition].] |
Pubbl/distr/stampa | Hoboken : , : ISTE Ltd : , : John Wiley and Sons Inc, , [2022] |
Descrizione fisica | 1 online resource (301 pages) |
Disciplina | 652.8 |
Collana | Sciences. Computer science. Cryptography, data security |
Soggetto topico |
Cryptography
Data encryption (Computer science) |
ISBN |
1-394-18836-6
1-394-18834-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto |
Cover -- Title Page -- Copyright Page -- Contents -- Foreword -- Chapter 1. Public-Key Encryption and Security Notions -- 1.1. Basic definitions for PKE -- 1.1.1. Basic notation -- 1.1.2. Public-key encryption -- 1.1.3. IND-CPA and IND-CCA security -- 1.1.4. Other basic security notions and relations -- 1.2. Basic PKE schemes -- 1.2.1. Game-based proofs -- 1.2.2. ElGamal encryption -- 1.2.3. Simplified CS encryption -- 1.2.4. Cramer-Shoup encryption -- 1.2.5. Other specific PKE schemes -- 1.3. Generic constructions for IND-CCA secure PKE -- 1.3.1. Hybrid encryption -- 1.3.2. Naor-Yung construction and extensions -- 1.3.3. Fujisaki-Okamoto and other transforms in the RO model -- 1.3.4. Other generic constructions for IND-CCA secure PKE -- 1.4. Advanced topics -- 1.4.1. Intermediate notions related to CCA -- 1.4.2. IND-CCA security in multi-user setting and tight security -- 1.4.3. Key-dependent message security -- 1.4.4. More topics on PKE -- 1.5. References -- Chapter 2. Signatures and Security Notions -- 2.1. Signature schemes -- 2.1.1. Definition -- 2.1.2. Examples of practical schemes -- 2.2. Unforgeability -- 2.2.1. Discussion -- 2.2.2. Existential unforgeability under chosen-message attacks -- 2.2.3. Unforgeability of practical schemes -- 2.3. Strong unforgeability -- 2.3.1. Discussion -- 2.3.2. Strong existential unforgeability under chosen-message attacks -- 2.3.3. Strong unforgeability of practical schemes -- 2.3.4. Building strongly unforgeable schemes -- 2.4. Summary -- 2.5. References -- Chapter 3. Zero-Knowledge Proofs -- 3.1. Introduction -- 3.2. Notation -- 3.3. Classical zero-knowledge proofs -- 3.3.1. Zero knowledge -- 3.4. How to build a zero-knowledge proof system -- 3.4.1. ZK proofs for all NP -- 3.4.2. Round complexity -- 3.5. Relaxed security in proof systems -- 3.5.1. Honest-verifier ZK.
3.5.2. Witness hiding/indistinguishability -- 3.5.3. Ó-Protocols -- 3.6. Non-black-box zero knowledge -- 3.7. Advanced notions -- 3.7.1. Publicly verifiable zero knowledge -- 3.7.2. Concurrent ZK and more -- 3.7.3. ZK with stateless players -- 3.7.4. Delayed-input proof systems -- 3.8. Conclusion -- 3.9. References -- Chapter 4. Secure Multiparty Computation -- 4.1. Introduction -- 4.1.1. A note on terminology -- 4.2. Security of MPC -- 4.2.1. The definitional paradigm -- 4.2.2. Additional definitional parameters -- 4.2.3. Adversarial power -- 4.2.4. Modular sequential and concurrent composition -- 4.2.5. Important definitional implications -- 4.2.6. The ideal model and using MPC in practice -- 4.2.7. Any inputs are allowed -- 4.2.8. MPC secures the process, but not the output -- 4.3. Feasibility of MPC -- 4.4. Techniques -- 4.4.1. Shamir secret sharing -- 4.4.2. Honest-majority MPC with secret sharing -- 4.4.3. Private set intersection -- 4.4.4. Threshold cryptography -- 4.4.5. Dishonest-majority MPC -- 4.4.6. Efficient and practical MPC -- 4.5. MPC use cases -- 4.5.1. Boston wage gap (Lapets et al. 2018) -- 4.5.2. Advertising conversion (Ion et al. 2017) -- 4.5.3. MPC for cryptographic key protection (Unbound Security -- Sepior -- Curv) -- 4.5.4. Government collaboration (Sharemind) -- 4.5.5. Privacy-preserving analytics (Duality) -- 4.6. Discussion -- 4.7. References -- Chapter 5. Pairing-Based Cryptography -- 5.1. Introduction -- 5.1.1. Notations -- 5.1.2. Generalities -- 5.2. One small step for man, one giant leap for cryptography -- 5.2.1. Opening Pandora's box, demystifying the magic -- 5.2.2. A new world of assumptions -- 5.3. A new world of cryptographic protocols at your fingertips -- 5.3.1. Identity-based encryption made easy -- 5.3.2. Efficient deterministic compact signature -- 5.4. References. Chapter 6. Broadcast Encryption and Traitor Tracing -- 6.1. Introduction -- 6.2. Security notions for broadcast encryption and TT -- 6.3. Overview of broadcast encryption and TT -- 6.4. Tree-based methods -- 6.5. Code-based TT -- 6.6. Algebraic schemes -- 6.7. Lattice-based approach with post-quantum security -- 6.8. References -- Chapter 7. Attribute-Based Encryption -- 7.1. Introduction -- 7.2. Pairing groups -- 7.2.1. Cyclic groups -- 7.2.2. Pairing groups -- 7.3. Predicate encodings -- 7.3.1. Definition -- 7.3.2. Constructions -- 7.4. Attribute-based encryption -- 7.4.1. Definition -- 7.4.2. A modular construction -- 7.5. References -- Chapter 8. Advanced Signatures -- 8.1. Introduction -- 8.2. Some constructions -- 8.2.1. The case of scalar messages -- 8.2.2. The case of non-scalar messages -- 8.3. Applications -- 8.3.1. Anonymous credentials -- 8.3.2. Group signatures -- 8.3.3. Direct anonymous attestations -- 8.4. References -- Chapter 9. Key Exchange -- 9.1. Key exchange fundamentals -- 9.1.1. Key exchange parties -- 9.1.2. Key exchange messages -- 9.1.3. Key derivation functions -- 9.2. Unauthenticated key exchange -- 9.2.1. Formal definitions and security models -- 9.2.2. Constructions and examples -- 9.3. Authenticated key exchange -- 9.3.1. Non-interactive key exchange -- 9.3.2. AKE security models -- 9.3.3. Constructions and examples -- 9.4. Conclusion -- 9.5. References -- Chapter 10. Password Authenticated Key Exchange: Protocols and Security Models -- 10.1. Introduction -- 10.2. First PAKE: EKE -- 10.3. Game-based model of PAKE security -- 10.3.1. The BPR security model -- 10.3.2. Implicit versus explicit authentication -- 10.3.3. Limitations of the BPR model -- 10.3.4. EKE instantiated with Diffie-Hellman KE -- 10.3.5. Implementing ideal cipher on arbitrary groups -- 10.4. Simulation-based model of PAKE security. 10.4.1. The BMP security model -- 10.4.2. Advantages of BMP definition: arbitrary passwords, tight security -- 10.4.3. EKE using RO-derived one-time pad encryption -- 10.4.4. BMP model for PAKE with explicit authentication (PAKE-EA) -- 10.5. Universally composable model of PAKE security -- 10.6. PAKE protocols in the standard model -- 10.7. PAKE efficiency optimizations -- 10.8. Asymmetric PAKE: PAKE for the client-server setting -- 10.9. Threshold PAKE -- 10.10. References -- Chapter 11. Verifiable Computation and Succinct Arguments for NP -- 11.1. Introduction -- 11.1.1. Background -- 11.2. Preliminaries -- 11.3. Verifiable computation -- 11.4. Constructing VC -- 11.4.1. VC for circuits in three steps -- 11.4.2. Succinct non-interactive arguments for non-deterministic computation -- 11.4.3. Verifiable computation from SNARG -- 11.5. A modular construction of SNARGs -- 11.5.1. Algebraic non-interactive linear proofs -- 11.5.2. Bilinear groups -- 11.5.3. SNARGs from algebraic NILPs with degree-2 verifiers using bilinear groups -- 11.6. Constructing algebraic NILPs for arithmetic circuits -- 11.6.1. Arithmetic circuits -- 11.6.2. Quadratic arithmetic programs -- 11.6.3. Algebraic NILP for QAPs -- 11.7. Conclusion -- 11.8. References -- List of Authors -- Index -- EULA. |
Record Nr. | UNINA-9910831087403321 |
Hoboken : , : ISTE Ltd : , : John Wiley and Sons Inc, , [2022] | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and Network Security [[electronic resource] ] : 5th International Conference, CANS 2006, Suzhou, China, December 8-10, 2006, Proceedings / / edited by David Pointcheval, Yi Mu, Kefei Chen |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIII, 384 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Management information systems Computer science Computers and civilization Computer communication systems Algorithms Cryptology Systems and Data Security Management of Computing and Information Systems Computers and Society Computer Communication Networks Algorithm Analysis and Problem Complexity |
ISBN | 3-540-49463-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems -- Efficient Identity-Based Encryption with Tight Security Reduction -- Key Exchange -- A Diffie-Hellman Key Exchange Protocol Without Random Oracles -- Authenticated Group Key Agreement for Multicast -- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks -- Authentication and Signatures -- Efficient Mutual Data Authentication Using Manually Authenticated Strings -- Achieving Multicast Stream Authentication Using MDS Codes -- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps -- Proxy Signatures -- Security Model of Proxy-Multi Signature Schemes -- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque -- Cryptanalysis -- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields -- Improved Collision Attack on Reduced Round Camellia -- Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks -- Implementation -- Bitslice Implementation of AES -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) -- Steganalysis and Watermarking -- Steganalysis Based on Differential Statistics -- Watermarking Essential Data Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing -- Intrusion Detection -- Cooperative Intrusion Detection for Web Applications -- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis -- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems -- A Multi-agent Cooperative Model and System for Integrated Security Monitoring -- Disponibility and Reliability -- Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network -- An Immune-Based Model for Service Survivability -- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. |
Record Nr. | UNISA-996466239003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Cryptology and network security : 5th international conference, CANS 2006, Suzhou, China, December 8-10, 2006 : proceedings / / David Pointcheval, Yi Mu, Kefei Chen (eds.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin ; ; [London], : Springer, c2006 |
Descrizione fisica | 1 online resource (XIII, 384 p.) |
Disciplina | 005.8 |
Altri autori (Persone) |
PointchevalDavid
MuYi ChenKefei <1959-> |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computer networks - Security measures
Cryptography |
ISBN | 3-540-49463-4 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Encryption -- Concrete Chosen-Ciphertext Secure Encryption from Subgroup Membership Problems -- Efficient Identity-Based Encryption with Tight Security Reduction -- Key Exchange -- A Diffie-Hellman Key Exchange Protocol Without Random Oracles -- Authenticated Group Key Agreement for Multicast -- Authenticated and Communication Efficient Group Key Agreement for Clustered Ad Hoc Networks -- Authentication and Signatures -- Efficient Mutual Data Authentication Using Manually Authenticated Strings -- Achieving Multicast Stream Authentication Using MDS Codes -- Shorter Verifier-Local Revocation Group Signatures from Bilinear Maps -- Proxy Signatures -- Security Model of Proxy-Multi Signature Schemes -- Efficient ID-Based One-Time Proxy Signature and Its Application in E-Cheque -- Cryptanalysis -- Side Channel Attacks and Countermeasures on Pairing Based Cryptosystems over Binary Fields -- Improved Collision Attack on Reduced Round Camellia -- Stealing Secrets with SSL/TLS and SSH – Kleptographic Attacks -- Implementation -- Bitslice Implementation of AES -- A Fast Algorithm for Determining the Linear Complexity of Periodic Sequences over GF(3) -- Steganalysis and Watermarking -- Steganalysis Based on Differential Statistics -- Watermarking Essential Data Structures for Copyright Protection -- Boolean Functions and Stream Ciphers -- A Note of Perfect Nonlinear Functions -- Chaotic Keystream Generator Using Coupled NDFs with Parameter Perturbing -- Intrusion Detection -- Cooperative Intrusion Detection for Web Applications -- Finding TCP Packet Round-Trip Time for Intrusion Detection: Algorithm and Analysis -- Smart Architecture for High-Speed Intrusion Detection and Prevention Systems -- A Multi-agent Cooperative Model and System for Integrated Security Monitoring -- Disponibility and Reliability -- Detecting DDoS Attacks Based on Multi-stream Fused HMM in Source-End Network -- An Immune-Based Model for Service Survivability -- X2BT Trusted Reputation System: A Robust Mechanism for P2P Networks. |
Altri titoli varianti | CANS 2006 |
Record Nr. | UNINA-9910483370903321 |
Berlin ; ; [London], : Springer, c2006 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Cryptology -- AFRICACRYPT 2011 [[electronic resource] ] : 4th International Conference on Cryptology in Africa, Dakar, Senegal, July 5-7, 2011, Proceedings / / edited by Abderrahmane Nitaj, David Pointcheval |
Edizione | [1st ed. 2011.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 |
Descrizione fisica | 1 online resource (XIII, 387 p. 52 illus., 8 illus. in color.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Management information systems Computer science Algorithms Computer security Operating systems (Computers) Cryptology Computer Communication Networks Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Systems and Data Security Operating Systems |
ISBN | 3-642-21969-1 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Record Nr. | UNISA-996465398703316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2011 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology – AFRICACRYPT 2014 [[electronic resource] ] : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings / / edited by David Pointcheval, Damien Vergnaud |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 476 p. 92 illus.) : online resource |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Numerical analysis Computers Management information systems Computer science Systems and Data Security Cryptology Coding and Information Theory Numeric Computing Computation by Abstract Devices Management of Computing and Information Systems |
ISBN | 3-319-06734-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New Results for Rank-Based Cryptography -- Public-Key Cryptography -- Proxy Re-Encryption Scheme Supporting a Selection of Delegatees -- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes -- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited -- Hash Functions -- Differential Biases in Reduced-Round Keccak -- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry -- Preimage Attacks on Reduced-Round Stribog -- Secret-Key Cryptanalysis -- Breaking the IOC Authenticated Encryption Mode -- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers -- Multidimensional Zero-Correlation Linear Cryptanalysis of E2 -- Public-Key Cryptanalysis and Number Theory Further Improvement of Factoring RSA Moduli with Implicit Hint -- New Attacks on the RSA Cryptosystem -- Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic Nets -- Hardware Implementation -- New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers -- Minimizing S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum -- Position-Based Cryptography from Noisy Channels -- Lattice-Based Cryptography -- A Comparison of the Homomorphic Encryption Schemes FV and YASHE -- Towards Lattice Based Aggregate Signatures -- Public-Key Cryptography -- A Second Look at Fischlin’s Transformation -- Anonymous IBE from Quadratic Residuosity with Improved Performance -- Expressive Attribute Based Signcryption with Constant-Size Ciphertext -- Secret-Key Cryptography.-DRECON: DPA Resistant Encryption by Construction -- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions -- Universal Hash-Function Families: From Hashing to Authentication. |
Record Nr. | UNISA-996203598503316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology – AFRICACRYPT 2014 : 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings / / edited by David Pointcheval, Damien Vergnaud |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XIV, 476 p. 92 illus.) : online resource |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Numerical analysis Computers Management information systems Computer science Systems and Data Security Cryptology Coding and Information Theory Numeric Computing Computation by Abstract Devices Management of Computing and Information Systems |
ISBN | 3-319-06734-6 |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | New Results for Rank-Based Cryptography -- Public-Key Cryptography -- Proxy Re-Encryption Scheme Supporting a Selection of Delegatees -- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes -- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited -- Hash Functions -- Differential Biases in Reduced-Round Keccak -- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry -- Preimage Attacks on Reduced-Round Stribog -- Secret-Key Cryptanalysis -- Breaking the IOC Authenticated Encryption Mode -- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers -- Multidimensional Zero-Correlation Linear Cryptanalysis of E2 -- Public-Key Cryptanalysis and Number Theory Further Improvement of Factoring RSA Moduli with Implicit Hint -- New Attacks on the RSA Cryptosystem -- Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic Nets -- Hardware Implementation -- New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers -- Minimizing S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum -- Position-Based Cryptography from Noisy Channels -- Lattice-Based Cryptography -- A Comparison of the Homomorphic Encryption Schemes FV and YASHE -- Towards Lattice Based Aggregate Signatures -- Public-Key Cryptography -- A Second Look at Fischlin’s Transformation -- Anonymous IBE from Quadratic Residuosity with Improved Performance -- Expressive Attribute Based Signcryption with Constant-Size Ciphertext -- Secret-Key Cryptography.-DRECON: DPA Resistant Encryption by Construction -- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions -- Universal Hash-Function Families: From Hashing to Authentication. |
Record Nr. | UNINA-9910483090603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in Cryptology – AFRICACRYPT 2016 [[electronic resource] ] : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings / / edited by David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 369 p. 49 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Numerical analysis Computers Management information systems Computer science Systems and Data Security Cryptology Coding and Information Theory Numeric Computing Computation by Abstract Devices Management of Computing and Information Systems |
ISBN | 3-319-31517-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Lattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure protocols.-Public-key cryptography. |
Record Nr. | UNISA-996465697603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. di Salerno | ||
|
Progress in Cryptology – AFRICACRYPT 2016 : 8th International Conference on Cryptology in Africa, Fes, Morocco, April 13-15, 2016, Proceedings / / edited by David Pointcheval, Abderrahmane Nitaj, Tajjeeddine Rachidi |
Edizione | [1st ed. 2016.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 |
Descrizione fisica | 1 online resource (X, 369 p. 49 illus.) |
Disciplina | 004 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Coding theory Information theory Numerical analysis Computers Management information systems Computer science Systems and Data Security Cryptology Coding and Information Theory Numeric Computing Computation by Abstract Devices Management of Computing and Information Systems |
ISBN | 3-319-31517-X |
Formato | Materiale a stampa ![]() |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Lattices -- Elliptic curves -- Secret-key cryptanalysis -- Efficient implementations -- Secure protocols.-Public-key cryptography. |
Record Nr. | UNINA-9910484699203321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2016 | ||
![]() | ||
Lo trovi qui: Univ. Federico II | ||
|