top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Information Security and Privacy [[electronic resource] ] : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Information Security and Privacy [[electronic resource] ] : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 540 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Coding theory
Information theory
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-45067-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Anonymity -- Grouping Verifiable Content for Selective Disclosure -- Evaluation of Anonymity of Practical Anonymous Communication Networks -- An Anonymous Credential System and a Privacy-Aware PKI -- Flaws in Some Robust Optimistic Mix-Nets -- Invited Talk (I) -- The Unsolvable Privacy Problem and Its Implications for Security Technologies -- Elliptic Curves -- The Security of Fixed versus Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains -- Generic GF(2m) Arithmetic in Software and Its Application to ECC -- An Addition Algorithm in Jacobian of C 34 Curve -- Crytpanalysis (I) -- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces -- Differential Fault Analysis on AES Key Schedule and Some Countermeasures -- On the Pseudorandomness of KASUMI Type Permutations -- Theoretical Analysis of ?2 Attack on RC6 -- Mobile and Network Security -- A Typed Theory for Access Control and Information Flow Control in Mobile Systems -- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach -- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications -- Practical Pay TV Schemes -- Cooperative Routers against DoS Attacks -- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs -- Malicious ICMP Tunneling: Defense against the Vulnerability -- On Fair E-cash Systems Based on Group Signature Schemes -- Invited Talk (II) -- A Taxonomy of Single Sign-On Systems -- Cryptanalysis (II) -- Key Recovery Attacks on the RMAC, TMAC, and IACBC -- Key Recovery Attacks on NTRU without Ciphertext Validation Routine -- Permanent Fault Attack on the Parameters of RSA with CRT -- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts -- Signature -- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings -- Digital Signature Schemes with Restriction on Signing Capability -- On the Exact Security of Multi-signature Schemes Based on RSA -- Cryptosystems (I) -- A Length-Flexible Threshold Cryptosystem with Applications -- Separating Encryption and Key Issuance in Digital Rights Management Systems -- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers -- Parallel Authentication and Public-Key Encryption -- Invited Talk (III) -- Is Cross-Platform Security Possible? -- Cryptosystems (II) -- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems -- Cryptanalysis of a New Cellular Automata Cryptosystem -- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers -- Clock-Controlled Shrinking Generator of Feedback Shift Registers -- Key Management -- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange -- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join -- Robust Software Tokens — Yet Another Method for Securing User’s Digital Identity -- Theory and Hash Functions -- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- New Constructions for Resilient and Highly Nonlinear Boolean Functions -- On Parallel Hash Functions Based on Block-Cipher -- Square Hash with a Small Key Size.
Record Nr. UNISA-996465900103316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security and Privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Information Security and Privacy : 8th Australasian Conference, ACISP 2003, Wollongong, Australia, July 9-11, 2003, Proceedings / / edited by Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 2003.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Descrizione fisica 1 online resource (XII, 540 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer networks
Operating systems (Computers)
Coding theory
Information theory
Algorithms
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Coding and Information Theory
Algorithm Analysis and Problem Complexity
Management of Computing and Information Systems
ISBN 3-540-45067-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Privacy and Anonymity -- Grouping Verifiable Content for Selective Disclosure -- Evaluation of Anonymity of Practical Anonymous Communication Networks -- An Anonymous Credential System and a Privacy-Aware PKI -- Flaws in Some Robust Optimistic Mix-Nets -- Invited Talk (I) -- The Unsolvable Privacy Problem and Its Implications for Security Technologies -- Elliptic Curves -- The Security of Fixed versus Random Elliptic Curves in Cryptography -- Cryptanalysis of the Full Version Randomized Addition-Subtraction Chains -- Generic GF(2m) Arithmetic in Software and Its Application to ECC -- An Addition Algorithm in Jacobian of C 34 Curve -- Crytpanalysis (I) -- Amplified Differential Power Cryptanalysis on Rijndael Implementations with Exponentially Fewer Power Traces -- Differential Fault Analysis on AES Key Schedule and Some Countermeasures -- On the Pseudorandomness of KASUMI Type Permutations -- Theoretical Analysis of ?2 Attack on RC6 -- Mobile and Network Security -- A Typed Theory for Access Control and Information Flow Control in Mobile Systems -- Provably Secure Mobile Key Exchange: Applying the Canetti-Krawczyk Approach -- Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications -- Practical Pay TV Schemes -- Cooperative Routers against DoS Attacks -- Detecting Distributed Denial of Service Attacks by Sharing Distributed Beliefs -- Malicious ICMP Tunneling: Defense against the Vulnerability -- On Fair E-cash Systems Based on Group Signature Schemes -- Invited Talk (II) -- A Taxonomy of Single Sign-On Systems -- Cryptanalysis (II) -- Key Recovery Attacks on the RMAC, TMAC, and IACBC -- Key Recovery Attacks on NTRU without Ciphertext Validation Routine -- Permanent Fault Attack on the Parameters of RSA with CRT -- Backdoor Attacks on Black-Box Ciphers Exploiting Low-Entropy Plaintexts -- Signature -- Efficient ID-Based Blind Signature and Proxy Signature from Bilinear Pairings -- Digital Signature Schemes with Restriction on Signing Capability -- On the Exact Security of Multi-signature Schemes Based on RSA -- Cryptosystems (I) -- A Length-Flexible Threshold Cryptosystem with Applications -- Separating Encryption and Key Issuance in Digital Rights Management Systems -- An Efficient Revocation Scheme with Minimal Message Length for Stateless Receivers -- Parallel Authentication and Public-Key Encryption -- Invited Talk (III) -- Is Cross-Platform Security Possible? -- Cryptosystems (II) -- A Novel Use of RBAC to Protect Privacy in Distributed Health Care Information Systems -- Cryptanalysis of a New Cellular Automata Cryptosystem -- A CCA2 Secure Key Encapsulation Scheme Based on 3rd Order Shift Registers -- Clock-Controlled Shrinking Generator of Feedback Shift Registers -- Key Management -- EPA: An Efficient Password-Based Protocol for Authenticated Key Exchange -- Constructing General Dynamic Group Key Distribution Schemes with Decentralized User Join -- Robust Software Tokens — Yet Another Method for Securing User’s Digital Identity -- Theory and Hash Functions -- Public-Key Cryptosystems Based on Class Semigroups of Imaginary Quadratic Non-maximal Orders -- New Constructions for Resilient and Highly Nonlinear Boolean Functions -- On Parallel Hash Functions Based on Block-Cipher -- Square Hash with a Small Key Size.
Record Nr. UNINA-9910768469703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2003
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected Areas in Cryptography [[electronic resource] ] : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers / / edited by Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
Selected Areas in Cryptography [[electronic resource] ] : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009, Revised Selected Papers / / edited by Michael J. Jacobson, Vincent Rijmen, Rei Safavi-Naini
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Descrizione fisica 1 online resource (XIII, 467 p.)
Disciplina 004n/a
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer programming
Computer security
Data structures (Computer science)
Coding theory
Information theory
Computer science—Mathematics
Cryptology
Programming Techniques
Systems and Data Security
Data Structures and Information Theory
Coding and Information Theory
Discrete Mathematics in Computer Science
Soggetto genere / forma Calgary (2009)
Kongress.
Online-Publikation
ISBN 3-642-05445-5
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function -- Miscellaneous Techniques -- More on Key Wrapping -- Information Theoretically Secure Multi Party Set Intersection Re-visited -- Real Traceable Signatures -- Hash Functions II -- Cryptanalysis of Hash Functions with Structures -- Cryptanalysis of the LANE Hash Function -- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 -- Hardware Implementation and Cryptanalysis -- A More Compact AES -- Optimization Strategies for Hardware-Based Cofactorization -- More on the Security of Linear RFID Authentication Protocols -- Differential Fault Analysis of Rabbit -- An Improved Recovery Algorithm for Decayed AES Key Schedule Images -- Block Ciphers -- Cryptanalysis of the Full MMB Block Cipher -- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis -- Improved Integral Attacks on MISTY1 -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption -- Implementation of Public Key Cryptography -- On Repeated Squarings in Binary Fields -- Highly Regular m-Ary Powering Ladders -- An Efficient Residue Group Multiplication for the ? T Pairing over -- Compact McEliece Keys from Goppa Codes -- Hash Functions and Stream Ciphers -- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård -- Cryptanalysis of Dynamic SHA(2) -- A New Approach for FCSRs -- New Cryptanalysis of Irregularly Decimated Stream Ciphers.
Record Nr. UNISA-996466276203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2009
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui