top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
BCC '19 : proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies, and Contracts : July 8, 2019, Auckland, New Zealand / / program chairs, Satya Lokam, Sushmita Ruj, Kouichi Sakurai
BCC '19 : proceedings of the Third ACM Workshop on Blockchains, Cryptocurrencies, and Contracts : July 8, 2019, Auckland, New Zealand / / program chairs, Satya Lokam, Sushmita Ruj, Kouichi Sakurai
Pubbl/distr/stampa New York : , : Association for Computing Machinery, , 2019
Descrizione fisica 1 online resource (26 pages) : illustrations
Disciplina 005.74
Collana ACM conferences
Soggetto topico Blockchains (Databases)
Cryptocurrencies
Electronic funds transfers
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910412315703321
New York : , : Association for Computing Machinery, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (715 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Computers - Access control
Data encryption (Computer science)
ISBN 3-030-90567-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNINA-9910508445903321
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Information security and privacy : 26th Australasian Conference, ACISP 2021, virtual event, December 1-3, 2021, proceedings / / Joonsang Baek, Sushmita Ruj (editors)
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2021]
Descrizione fisica 1 online resource (715 pages)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Computers - Access control
Data encryption (Computer science)
ISBN 3-030-90567-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Record Nr. UNISA-996464389003316
Cham, Switzerland : , : Springer, , [2021]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – INDOCRYPT 2019 [[electronic resource] ] : 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings / / edited by Feng Hao, Sushmita Ruj, Sourav Sen Gupta
Progress in Cryptology – INDOCRYPT 2019 [[electronic resource] ] : 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings / / edited by Feng Hao, Sushmita Ruj, Sourav Sen Gupta
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xxiii, 580 pages) : illustrations
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Application software
Coding theory
Information theory
Data protection
Cryptology
Computer Communication Networks
Computer and Information Systems Applications
Coding and Information Theory
Security Services
Data and Information Security
ISBN 3-030-35423-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Constructions : Signatures and Filter Permutators -- PKP-Based Signature scheme -- Modification tolerant signature schemes: location and correction -- Rerandomizable Signatures under Standard Assumption -- Improved Filter Permutators for Efficient FHE: Better Instances and Implementations -- Cryptanalysis : Symmetric Key Ciphers and Hash Functions -- RC4: Non-Randomness in the index j and some results on its Cycles -- Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications -- Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128 -- Some cryptanalytic results on TRIAD -- Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures -- Protocols : Blockchain, Secure Computation and Blind Coupon Mechanism -- Nummatus : A Privacy Preserving Proof of Reserves Protocol for Quisquis -- Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation -- MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security -- A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks -- Theory: Oblivious Transfer, Obfuscation and Privacy Amplification -- UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing -- Public-coin Differing-inputs Obfuscator for Hiding-input Point Function with Multi-bit Output and Its Applications -- Privacy Amplification from Non-malleable Codes -- Mathematics : Boolean Functions, Elliptic Curves and Lattices -- Vectorial Boolean Functions with very Low Differential-linear Uniformity using Maiorana-McFarland type Construction -- On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes -- The complete cost of cofactor h=1 -- Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction -- Quantum : Algorithms, Attacks and Key Distribution -- Efficient Quantum Algorithms related to Autocorrelation Spectrum -- Quantum Attacks against Type-1 Generalized Feistel Ciphers and Applications to CAST-256 -- Device Independent Quantum Key Distribution using Three-Party Pseudo-Telepathy -- Generalized Approach for Analysing Quantum Key Distribution Experiments -- Hardware : Efficiency, Side-Channel Resistance and PUFs -- Efficient Hardware Implementations of Grain-128AEAD -- Exploring Lightweight Efficiency of ForkAES -- FPGA Implementation and Comparison of Protections against SCAs for RLWE -- Analysis of the Strict Avalanche Criterion in variants of Arbiter-based Physically Unclonable Functions.
Record Nr. UNISA-996466193803316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – INDOCRYPT 2019 : 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings / / edited by Feng Hao, Sushmita Ruj, Sourav Sen Gupta
Progress in Cryptology – INDOCRYPT 2019 : 20th International Conference on Cryptology in India, Hyderabad, India, December 15–18, 2019, Proceedings / / edited by Feng Hao, Sushmita Ruj, Sourav Sen Gupta
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (xxiii, 580 pages) : illustrations
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks
Application software
Coding theory
Information theory
Data protection
Cryptology
Computer Communication Networks
Computer and Information Systems Applications
Coding and Information Theory
Security Services
Data and Information Security
ISBN 3-030-35423-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Constructions : Signatures and Filter Permutators -- PKP-Based Signature scheme -- Modification tolerant signature schemes: location and correction -- Rerandomizable Signatures under Standard Assumption -- Improved Filter Permutators for Efficient FHE: Better Instances and Implementations -- Cryptanalysis : Symmetric Key Ciphers and Hash Functions -- RC4: Non-Randomness in the index j and some results on its Cycles -- Automatic Tool for Searching for Differential Characteristics in ARX Ciphers and Applications -- Improved Related-Tweakey Rectangle Attacks on Reduced-round Deoxys-BC-384 and Deoxys-I-256-128 -- Some cryptanalytic results on TRIAD -- Cryptanalysis of Round-Reduced KECCAK using Non-Linear Structures -- Protocols : Blockchain, Secure Computation and Blind Coupon Mechanism -- Nummatus : A Privacy Preserving Proof of Reserves Protocol for Quisquis -- Optimality of a Protocol by Feige-Kilian-Naor for Three-Party Secure Computation -- MArBled Circuits: Mixing Arithmetic and Boolean Circuits with Active Security -- A Blind Coupon Mechanism Enabling Veto Voting over Unreliable Networks -- Theory: Oblivious Transfer, Obfuscation and Privacy Amplification -- UC Priced Oblivious Transfer with Purchase Statistics and Dynamic Pricing -- Public-coin Differing-inputs Obfuscator for Hiding-input Point Function with Multi-bit Output and Its Applications -- Privacy Amplification from Non-malleable Codes -- Mathematics : Boolean Functions, Elliptic Curves and Lattices -- Vectorial Boolean Functions with very Low Differential-linear Uniformity using Maiorana-McFarland type Construction -- On the Relationship between Resilient Boolean Functions and Linear Branch Number of S-boxes -- The complete cost of cofactor h=1 -- Revisiting Approximate Polynomial Common Divisor Problem and Noisy Multipolynomial Reconstruction -- Quantum : Algorithms, Attacks and Key Distribution -- Efficient Quantum Algorithms related to Autocorrelation Spectrum -- Quantum Attacks against Type-1 Generalized Feistel Ciphers and Applications to CAST-256 -- Device Independent Quantum Key Distribution using Three-Party Pseudo-Telepathy -- Generalized Approach for Analysing Quantum Key Distribution Experiments -- Hardware : Efficiency, Side-Channel Resistance and PUFs -- Efficient Hardware Implementations of Grain-128AEAD -- Exploring Lightweight Efficiency of ForkAES -- FPGA Implementation and Comparison of Protections against SCAs for RLWE -- Analysis of the Strict Avalanche Criterion in variants of Arbiter-based Physically Unclonable Functions.
Record Nr. UNINA-9910364955503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui