top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings / / Josef Pieprzyk, Reihanah Safavi-Naini, eds
Advances in cryptology, ASIACRYPT '94 : 4th International Conference on the Theory and Applications of Cryptology, Wollongong, Australia, November 28-December 1, 1994 : proceedings / / Josef Pieprzyk, Reihanah Safavi-Naini, eds
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 005.8/2
Altri autori (Persone) Safavi-NainiReihanah
PieprzykJosef
Soggetto topico Computer security - Congresses
Cryptography - Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Advances in Cryptology — ASIACRYPT'94
Record Nr. UNISA-996466116503316
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / / Reihaneh Safavi-Naini, Moti Yung (eds.)
Digital rights management : technologies, issues, challenges and systems : first international conference, DRMTICS 2005, Sydney, Australia, October 31-November 2, 2005 : revised selected papers / / Reihaneh Safavi-Naini, Moti Yung (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, : Springer, 2006
Descrizione fisica 1 online resource (XII, 360 p.)
Disciplina 005.82
Altri autori (Persone) Safavi-NainiReihanah
YungMoti
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Copyright and electronic data processing
Data protection
Internet industry - Security measures
Piracy (Copyright) - Prevention
Intellectual property
Software protection
ISBN 3-540-35999-0
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Assurance and Authentication Issues -- A Novel Framework for Multiple Creatorship Protection of Digital Movies -- TIVA: Trusted Integrity Verification Architecture -- Legal and Related Issues -- The Australian Sony PlayStation Case: How Far Will Anti-circumvention Law Reach in the Name of DRM? -- Downloading vs Purchase: Music Industry vs Consumers -- Digital Rights Management: Merging Contract, Copyright and Criminal Law -- Expressing Rights and Management -- User-Attributed Rights in DRM -- AVS-REL—A New Right Expression Language -- A Comparative Study of Specification Models for Autonomic Access Control of Digital Rights -- Watermarking -- The Effect of Fidelity Measure Functions on the Capacity of Digital Watermarks -- A MPEG-2 Video Watermarking Algorithm with Compensation in Bit Stream -- Reversible Semi-fragile Image Authentication Using Zernike Moments and Integer Wavelet Transform -- Software Issues -- Software Tamper Resistance Through Dynamic Program Monitoring -- Call Tree Transformation for Program Obfuscation and Copy Protection -- Algorithms to Watermark Software Through Register Allocation -- Fingerprinting and Image Authentication -- An Efficient Fingerprinting Scheme with Secret Sharing -- Worst-Case Optimal Fingerprinting Codes for Non-threshold Collusion -- Secure Remote Fingerprint Verification Using Dual Watermarks -- Supporting Cryptographic Technology -- Security Weaknesses of Certain Broadcast Encryption Schemes -- A Broadcast Encryption Scheme with Free-Riders but Unconditional Security -- A Novel Broadcast Encryption Based on Time-Bound Cryptographic Keys -- A Vector Approach to Cryptography Implementation -- P2P Issues -- A Novel Privacy and Copyright Protection Enforced Peer-to-Peer Network -- Design of a Secure Digital Contents Delivery System in P2P Networks -- Implementations and Architectures -- Real-Time Implementation of Broadcast Switching System Using Audio Watermark -- Enforcing Regional DRM for Multimedia Broadcasts With and Without Trusted Computing -- A DRM System Supporting What You See Is What You Pay.
Altri titoli varianti DRMTICS 2005
Record Nr. UNINA-9910484944103321
Berlin, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
DRM '05 : proceedings of the fifth ACM Workshop on Digital Rights Management : November 7, 2005, Alexandria, Virginia, USA (co-located with CCS 2005
DRM '05 : proceedings of the fifth ACM Workshop on Digital Rights Management : November 7, 2005, Alexandria, Virginia, USA (co-located with CCS 2005
Pubbl/distr/stampa [Place of publication not identified], : ACM, 2005
Descrizione fisica 1 online resource (120 pages)
Collana ACM Conferences
Soggetto topico Engineering & Applied Sciences
Computer Science
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Digital Rights Management '05 : proceedings of the fifth Association for Computing Machinery Workshop on Digital Rights Management : November 7, 2005, Alexandria, Virginia, United States of America (co-located with Computer and Communications Security 2005)
Proceedings of the 5th ACM Workshop on Digital Rights Management
Record Nr. UNINA-9910375920103321
[Place of publication not identified], : ACM, 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, revised selected papers / / Rainer Bohme, Philip W.L. Fong, Reihaneh Safavi-Naini (eds.)
Information hiding : 12th International Conference, IH 2010, Calgary, AB, Canada, June 28-30, 2010, revised selected papers / / Rainer Bohme, Philip W.L. Fong, Reihaneh Safavi-Naini (eds.)
Edizione [1st ed.]
Pubbl/distr/stampa New York, : Springer, 2010
Descrizione fisica 1 online resource (X, 277 p. 98 illus.)
Disciplina 005.8
Altri autori (Persone) BohmeRainer
FongPhilip W. L
Safavi-NainiReihanah
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Data protection
ISBN 1-280-38991-5
9786613567833
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto FPGA Time-Bounded Unclonable Authentication -- A Unified Submodular Framework for Multimodal IC Trojan Detection -- A Secure and Robust Approach to Software Tamper Resistance -- Security with Noisy Data -- Detection of Copy-Rotate-Move Forgery Using Zernike Moments -- Scene Illumination as an Indicator of Image Manipulation -- Capacity of Collusion Secure Fingerprinting — A Tradeoff between Rate and Efficiency -- Short Collusion-Secure Fingerprint Codes against Three Pirates -- Tardos’s Fingerprinting Code over AWGN Channel -- Steganalysis Using Partially Ordered Markov Models -- The Influence of the Image Basis on Modeling and Steganalysis Performance -- The Square Root Law in Stegosystems with Imperfect Information -- Using High-Dimensional Image Models to Perform Highly Undetectable Steganography -- Obtaining Higher Rates for Steganographic Schemes While Maintaining the Same Detectability -- Robust and Undetectable Steganographic Timing Channels for i.i.d. Traffic -- STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography -- The Reverse Statistical Disclosure Attack -- Security Analysis of ISS Watermarking Using Natural Scene Statistics -- Provably Secure Spread-Spectrum Watermarking Schemes in the Known Message Attack Framework -- A New Spread Spectrum Watermarking Scheme to Achieve a Trade-Off between Security and Robustness.
Record Nr. UNINA-9910483272203321
New York, : Springer, 2010
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings / / Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.)
Information security and privacy : 11th Australasian conference, ACISP 2006, Melbourne, Australia, July 3-5, 2006 : proceedings / / Lynn Margaret Batten, Reihaneh Safavi-Naini (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, : Springer, 2006
Descrizione fisica 1 online resource (XII, 446 p.)
Disciplina 005.8
Altri autori (Persone) BattenLynn Margaret
Safavi-NainiReihanah
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computers - Access control
Computer security
Data protection
ISBN 3-540-35459-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stream Ciphers -- Algebraic Attacks on Clock-Controlled Stream Ciphers -- Cache Based Power Analysis Attacks on AES -- Distinguishing Attack on SOBER-128 with Linear Masking -- Evaluating the Resistance of Stream Ciphers with Linear Feedback Against Fast Algebraic Attacks -- Symmetric Key Ciphers -- Ensuring Fast Implementations of Symmetric Ciphers on the Intel Pentium 4 and Beyond -- Improved Cryptanalysis of MAG -- On Exact Algebraic [Non-]Immunity of S-Boxes Based on Power Functions -- Network Security -- Augmented Certificate Revocation Lists -- Online/Offline Signatures and Multisignatures for AODV and DSR Routing Security -- Towards an Invisible Honeypot Monitoring System -- Cryptographic Applications -- Adaptively Secure Traitor Tracing Against Key Exposure and Its Application to Anywhere TV Service -- Fingercasting—Joint Fingerprinting and Decryption of Broadcast Messages -- More on Stand-Alone and Setup-Free Verifiably Committed Signatures -- Secure Implementation -- API Monitoring System for Defeating Worms and Exploits in MS-Windows System -- Hiding Circuit Topology from Unbounded Reverse Engineers -- The Role of the Self-Defending Object Concept in Developing Distributed Security-Aware Applications -- Signatures -- Efficient and Provably Secure Multi-receiver Identity-Based Signcryption -- Efficient Identity-Based Signatures Secure in the Standard Model -- Event-Oriented k-Times Revocable-iff-Linked Group Signatures -- Key Replacement Attack Against a Generic Construction of Certificateless Signature -- Theory -- A Novel Range Test -- Efficient Primitives from Exponentiation in ? p -- PA in the Two-Key Setting and a Generic Conversion for Encryption with Anonymity -- Statistical Decoding Revisited -- Invited Talk -- Towards Provable Security for Ubiquitous Applications -- Security Applications -- Oblivious Scalar-Product Protocols -- On Optimizing the k-Ward Micro-aggregation Technique for Secure Statistical Databases -- Provable Security -- Direct Chosen-Ciphertext Secure Identity-Based Key Encapsulation Without Random Oracles -- Generic Transforms to Acquire CCA-Security for Identity Based Encryption: The Cases of FOpkc and REACT -- Tag-KEM from Set Partial Domain One-Way Permutations -- Protocols -- An Extension to Bellare and Rogaway (1993) Model: Resetting Compromised Long-Term Keys -- Graphical Representation of Authorization Policies for Weighted Credentials -- Secure Cross-Realm C2C-PAKE Protocol -- Hashing and Message Authentication -- Constructing Secure Hash Functions by Enhancing Merkle-Damgård Construction -- Forgery and Key Recovery Attacks on PMAC and Mitchell’s TMAC Variant -- Side Channel Attacks Against HMACs Based on Block-Cipher Based Hash Functions.
Altri titoli varianti ACISP 2006
Record Nr. UNINA-9910484198103321
Berlin, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Descrizione fisica 1 online resource (336 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Privacy, Right of
Data protection
Computer security
ISBN 1-280-80455-6
9786610804559
3-540-48970-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Boolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action.
Record Nr. UNINA-9910143452003321
Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Information security and privacy : 12th australasian conference, acisp 2007, townsville, australia, july 2-4, 2007 : proceedings / / edited by Josef Pieprzyk, Rei Safavi-Naini, Jennifer Seberry
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Descrizione fisica 1 online resource (336 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Privacy, Right of
Data protection
Computer security
ISBN 1-280-80455-6
9786610804559
3-540-48970-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Boolean Functions -- Boolean Function Design Using Hill Climbing Methods -- Enumeration of Correlation Immune Boolean Functions -- On the Symmetric Property of Homogeneous Boolean Functions -- Key Management -- Publicly Verifiable Key Escrow with Limited Time Span -- Accelerating Key Establishment Protocols for Mobile Communication -- Conference Key Agreement from Secret Sharing -- Cryptanalysis -- On m-Permutation Protection Scheme against Modification Attack -- Inversion Attack and Branching -- Signatures -- Fail-Stop Threshold Signature Schemes Based on Elliptic Curves -- Divertible Zero-Knowledge Proof of Polynomial Relations and Blind Group Signature -- Repudiation of Cheating and Non-repudiation of Zhang’s Proxy Signature Schemes -- RSA Cryptosystems -- On the Security of an RSA Based Encryption Scheme -- Generalised Cycling Attacks on RSA and Strong RSA Primes -- RSA Acceleration with Field Programmable Gate Arrays -- Group Cryptography -- Changing Thresholds in the Absence of Secure Channels -- A Self-Certified Group-Oriented Cryptosystem without a Combiner -- Network Security -- Companion Viruses and the Macintosh: Threats and Countermeasures -- An Implementation of a Secure Version of NFS Including RBAC -- Electronic Commerce -- Group Signatures and Their Relevance to Privacy-Protecting Offline Electronic Cash Systems -- Effient Electronic Cash Using Batch Signatures -- Evolution of Fair Non-repudiation with TTP -- Access Control -- Authorization in Object Oriented Databases -- An Analysis of Access Control Models -- Odds and Ends -- Efficient Identity Based Parameter Selection for Elliptic Curve Cryptosystems -- Characterization of Optimal Authentication Codes with Arbitration -- A Functional Cryptosystem Using a Group Action.
Record Nr. UNISA-996465625503316
Berlin, Germany ; ; New York, New York : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information theoretic security : third international conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. proceedings / / Editor, Reihaneh Safavi-Naini
Information theoretic security : third international conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. proceedings / / Editor, Reihaneh Safavi-Naini
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XI, 249 p.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Cryptography
Computer security
ISBN 3-540-85093-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Reliable Communication I -- Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk) -- Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption -- Quantum Information and Communication -- Interactive Hashing: An Information Theoretic Tool (Invited Talk) -- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network -- Networks and Devices -- Strong Secrecy for Wireless Channels (Invited Talk) -- Efficient Key Predistribution for Grid-Based Wireless Sensor Networks -- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk) -- Mulitparty Computation -- A Single Initialization Server for Multi-party Cryptography -- Statistical Security Conditions for Two-Party Secure Function Evaluation -- Information Hiding and Tracing -- Upper Bounds for Set Systems with the Identifiable Parent Property -- Coding Theory and Security -- Oblivious Transfer Based on the McEliece Assumptions -- List Error-Correction with Optimal Information Rate (Invited Talk) -- Quantum Computation -- Theory of Quantum Key Distribution: The Road Ahead (Invited Talk) -- Susceptible Two-Party Quantum Computations -- Secure and Reliable Communication II -- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary -- Key Refreshing in Wireless Sensor Networks -- Efficient Traitor Tracing from Collusion Secure Codes -- Foundation -- Revisiting the Karnin, Greene and Hellman Bounds -- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification -- The Complexity of Distinguishing Distributions (Invited Talk) -- Encryption -- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) -- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations.
Record Nr. UNINA-9910484384403321
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information theoretic security : third international conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. proceedings / / Editor, Reihaneh Safavi-Naini
Information theoretic security : third international conference, ICITS 2008, Calgary, Canada, August 10-13, 2008. proceedings / / Editor, Reihaneh Safavi-Naini
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XI, 249 p.)
Disciplina 004
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Cryptography
Computer security
ISBN 3-540-85093-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Secure and Reliable Communication I -- Partially Connected Networks: Information Theoretically Secure Protocols and Open Problems (Invited Talk) -- Almost Secure 1-Round Message Transmission Scheme with Polynomial-Time Message Decryption -- Quantum Information and Communication -- Interactive Hashing: An Information Theoretic Tool (Invited Talk) -- Distributed Relay Protocol for Probabilistic Information-Theoretic Security in a Randomly-Compromised Network -- Networks and Devices -- Strong Secrecy for Wireless Channels (Invited Talk) -- Efficient Key Predistribution for Grid-Based Wireless Sensor Networks -- Does Physical Security of Cryptographic Devices Need a Formal Study? (Invited Talk) -- Mulitparty Computation -- A Single Initialization Server for Multi-party Cryptography -- Statistical Security Conditions for Two-Party Secure Function Evaluation -- Information Hiding and Tracing -- Upper Bounds for Set Systems with the Identifiable Parent Property -- Coding Theory and Security -- Oblivious Transfer Based on the McEliece Assumptions -- List Error-Correction with Optimal Information Rate (Invited Talk) -- Quantum Computation -- Theory of Quantum Key Distribution: The Road Ahead (Invited Talk) -- Susceptible Two-Party Quantum Computations -- Secure and Reliable Communication II -- Perfectly Reliable and Secure Communication Tolerating Static and Mobile Mixed Adversary -- Key Refreshing in Wireless Sensor Networks -- Efficient Traitor Tracing from Collusion Secure Codes -- Foundation -- Revisiting the Karnin, Greene and Hellman Bounds -- Simple Direct Reduction of String (1,2)-OT to Rabin’s OT without Privacy Amplification -- The Complexity of Distinguishing Distributions (Invited Talk) -- Encryption -- Some Information Theoretic Arguments for Encryption: Non-malleability and Chosen-Ciphertext Security (Invited Talk) -- A Proof of Security in O(2 n ) for the Xor of Two Random Permutations.
Record Nr. UNISA-996465994103316
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 ; revised selected papers / / Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.)
Selected areas in cryptography : 16th International Workshop, SAC 2009, Calgary, Alberta, Canada, August 13-14, 2009 ; revised selected papers / / Michael J. Jacobson Jr., Vincent Rijmen, Reihaneh Safavi-Naini (eds.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa New York ; ; Berlin, : Springer, c2009
Descrizione fisica 1 online resource (XIII, 467 p.)
Disciplina 004n/a
Altri autori (Persone) JacobsonMichael J
RijmenVincent <1970->
Safavi-NainiReihanah
Collana Lecture notes in computer science
Soggetto topico Cryptography
Data encryption (Computer science)
ISBN 3-642-05445-5
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Functions I -- Practical Collisions for SHAMATA-256 -- Improved Cryptanalysis of the Reduced Grøstl Compression Function, ECHO Permutation and AES Block Cipher -- Cryptanalyses of Narrow-Pipe Mode of Operation in AURORA-512 Hash Function -- Miscellaneous Techniques -- More on Key Wrapping -- Information Theoretically Secure Multi Party Set Intersection Re-visited -- Real Traceable Signatures -- Hash Functions II -- Cryptanalysis of Hash Functions with Structures -- Cryptanalysis of the LANE Hash Function -- Practical Pseudo-collisions for Hash Functions ARIRANG-224/384 -- Hardware Implementation and Cryptanalysis -- A More Compact AES -- Optimization Strategies for Hardware-Based Cofactorization -- More on the Security of Linear RFID Authentication Protocols -- Differential Fault Analysis of Rabbit -- An Improved Recovery Algorithm for Decayed AES Key Schedule Images -- Block Ciphers -- Cryptanalysis of the Full MMB Block Cipher -- Weak Keys of Reduced-Round PRESENT for Linear Cryptanalysis -- Improved Integral Attacks on MISTY1 -- New Results on Impossible Differential Cryptanalysis of Reduced–Round Camellia–128 -- Modes of Operation -- Format-Preserving Encryption -- BTM: A Single-Key, Inverse-Cipher-Free Mode for Deterministic Authenticated Encryption -- Implementation of Public Key Cryptography -- On Repeated Squarings in Binary Fields -- Highly Regular m-Ary Powering Ladders -- An Efficient Residue Group Multiplication for the ? T Pairing over -- Compact McEliece Keys from Goppa Codes -- Hash Functions and Stream Ciphers -- Herding, Second Preimage and Trojan Message Attacks beyond Merkle-Damgård -- Cryptanalysis of Dynamic SHA(2) -- A New Approach for FCSRs -- New Cryptanalysis of Irregularly Decimated Stream Ciphers.
Record Nr. UNINA-9910484329303321
New York ; ; Berlin, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui