Advances in cryptology - EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, proceedings, Part III / / Anne Canteaut, Francois-Xavier Standaert (editors)
| Advances in cryptology - EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, proceedings, Part III / / Anne Canteaut, Francois-Xavier Standaert (editors) |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (590 pages) |
| Disciplina | 005.82 |
| Collana | Lecture notes in computer science |
| Soggetto topico | Data encryption (Computer science) |
| ISBN | 3-030-77883-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464505903316 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in cryptology - EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, proceedings, Part II / / Anne Canteaut, François-Xavier Standaert (editors)
| Advances in cryptology - EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, proceedings, Part II / / Anne Canteaut, François-Xavier Standaert (editors) |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (937 pages) |
| Disciplina | 005.82 |
| Collana | Lecture notes in computer science |
| Soggetto topico | Data encryption (Computer science) |
| ISBN | 3-030-77886-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464503903316 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in cryptology - EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, proceedings, Part I / / Anne Canteaut, Francois-Xavier Standaert (editors)
| Advances in cryptology - EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17-21, 2021, proceedings, Part I / / Anne Canteaut, Francois-Xavier Standaert (editors) |
| Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2021] |
| Descrizione fisica | 1 online resource (849 pages) |
| Disciplina | 005.82 |
| Collana | Lecture notes in computer science |
| Soggetto topico | Data encryption (Computer science) |
| ISBN | 3-030-77870-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Record Nr. | UNISA-996464504803316 |
| Cham, Switzerland : , : Springer, , [2021] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III / / edited by Anne Canteaut, François-Xavier Standaert
| Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part III / / edited by Anne Canteaut, François-Xavier Standaert |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (590 pages) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer engineering Computer networks Coding theory Information theory Data protection Application software Cryptology Computer Engineering and Networks Coding and Information Theory Data and Information Security Computer and Information Systems Applications |
| ISBN | 3-030-77883-5 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Garbled Circuits -- LogStack: Stacked Garbling with O(b log b) Computation -- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits -- Threshold Garbled Circuits and Ad Hoc Secure Computation -- Indistinguishability Obfuscation -- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification -- Candidate Obfuscation via Oblivious LWE Sampling -- Non-Malleable Commitments -- Black-Box Non-Interactive Non-Malleable Commitments -- Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments -- Zero-Knowledge Proofs -- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers -- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments -- Towards Accountability in CRS Generation -- Property-Preserving Hash Functions and ORAM -- Robust Property-Preserving Hash Functions for Hamming Distance and More -- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution -- Structured Encryption and Dynamic Leakage Suppression -- Blockchain -- Dynamic Ad Hoc Clock Synchronization -- TARDIS: A Foundation of Time-Lock Puzzles in UC -- Privacy and Law Enforcement -- On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy -- Non-Interactive Anonymous Router -- "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures -- Abuse Resistant Law Enforcement Access Systems. . |
| Record Nr. | UNINA-9910485586903321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II / / edited by Anne Canteaut, François-Xavier Standaert
| Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part II / / edited by Anne Canteaut, François-Xavier Standaert |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (937 pages) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Computer networks Coding theory Information theory Data protection Application software Cryptology Computer Communication Networks Coding and Information Theory Data and Information Security Computer and Information Systems Applications |
| ISBN | 3-030-77886-X |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Symmetric Designs -- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields -- Mind the Middle Layer: The HADES Design Strategy Revisited -- Password Hashing and Preprocessing -- Compactness of Hashing Modes and Efficiency beyond Merkle Tree -- Real-World Cryptanalysis -- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3 -- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2 -- Implementation Issues -- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited -- Dummy Shuffling against Algebraic Attacks in White-box Implementations -- Advanced Lattice Sieving on GPUs, with Tensor Cores -- Masking and Secret-Sharing -- Fast verification of masking schemes in characteristic two -- On the Power of Expansion: More Efficient Constructions in the Random Probing Model -- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages -- Leakage, Faults and Tampering -- Leakage Resilient Value Comparison With Application to Message Authentication -- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free -- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem -- Multi-Source Non-Malleable Extractors and Applications -- Quantum Constructions and Proofs -- Secure Software Leasing -- Oblivious Transfer is in MiniQCrypt -- Security Analysis of Quantum Lightning -- Classical vs Quantum Random Oracles -- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work -- Classical proofs of quantum knowledge -- Multiparty Computation -- Order-C Secure Multiparty Computation for Highly Repetitive Circuits -- The More The Merrier: Reducing the Cost of Large Scale MPC -- Multi-Party Reusable Non-Interactive Secure Computation from LWE -- Unbounded Multi-Party Computation from Learning with Errors -- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation -- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields -- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN -- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation -- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE. |
| Record Nr. | UNINA-9910485586803321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I / / edited by Anne Canteaut, François-Xavier Standaert
| Advances in Cryptology – EUROCRYPT 2021 : 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croatia, October 17–21, 2021, Proceedings, Part I / / edited by Anne Canteaut, François-Xavier Standaert |
| Edizione | [1st ed. 2021.] |
| Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 |
| Descrizione fisica | 1 online resource (849 pages) |
| Disciplina | 005.82 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Coding theory Information theory Data protection Application software Numerical analysis Cryptology Coding and Information Theory Data and Information Security Computer and Information Systems Applications Numerical Analysis |
| ISBN | 3-030-77870-3 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Non-Interactive Zero Knowledge from Sub-exponential DDH -- On the (in)security of ROS -- New Representations of the AES Key Schedule -- Public-Key Cryptography -- Analysing the HPKE Standard -- Tightly-Secure Authenticated Key Exchange, Revisited -- Aggregatable Distributed Key Generation -- Decentralized Multi-Authority ABE for DNFs from LWE -- Isogenies -- Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer -- One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols -- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem -- Delay Encryption -- Post-Quantum Cryptography -- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes -- Improved cryptanalysis of UOV and Rainbow -- Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2) -- Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions -- Post-Quantum Multi-Party Computation -- Lattices -- A 2ⁿ/² -Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP -- New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption – Stronger Security and Smaller Ciphertexts -- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem -- On the ideal shortest vector problem over random rational primes -- Homomorphic Encryption -- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys -- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function -- On the Security of Homomorphic Encryption on Approximate Numbers -- The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT -- Symmetric Cryptanalysis -- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha -- Rotational Cryptanalysis From a Differential-Linear Perspective – Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette -- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing -- A Deeper Look at Machine Learning-Based Cryptanalysis. . |
| Record Nr. | UNINA-9910485587003321 |
| Cham : , : Springer International Publishing : , : Imprint : Springer, , 2021 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Cryptographic hardware and embedded systems--CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings / / Stefan Mangard, Francois-Xavier Standaert (eds.)
| Cryptographic hardware and embedded systems--CHES 2010 : 12th international workshop, Santa Barbara, USA, August 17-20, 2010 : proceedings / / Stefan Mangard, Francois-Xavier Standaert (eds.) |
| Edizione | [1st ed. 2010.] |
| Pubbl/distr/stampa | Berlin, : Springer, 2010 |
| Descrizione fisica | 1 online resource (XIII, 458 p. 142 illus.) |
| Disciplina | 005.8 |
| Altri autori (Persone) |
MangardStefan
StandaertFrançois-Xavier |
| Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
| Soggetto topico |
Embedded computer systems
Cryptography Computer security |
| ISBN | 3-642-15031-4 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Low Cost Cryptography -- Quark: A Lightweight Hash -- PRINTcipher: A Block Cipher for IC-Printing -- Sponge-Based Pseudo-Random Number Generators -- Efficient Implementations I -- A High Speed Coprocessor for Elliptic Curve Scalar Multiplications over -- Co-Z Addition Formulæ and Binary Ladders on Elliptic Curves -- Efficient Techniques for High-Speed Elliptic Curve Cryptography -- Side-Channel Attacks and Countermeasures I -- Analysis and Improvement of the Random Delay Countermeasure of CHES 2009 -- New Results on Instruction Cache Attacks -- Correlation-Enhanced Power Analysis Collision Attack -- Side-Channel Analysis of Six SHA-3 Candidates -- Tamper Resistance and Hardware Trojans -- Flash Memory ‘Bumping’ Attacks -- Self-referencing: A Scalable Side-Channel Approach for Hardware Trojan Detection -- When Failure Analysis Meets Side-Channel Attacks -- Efficient Implementations II -- Fast Exhaustive Search for Polynomial Systems in -- 256 Bit Standardized Crypto for 650 GE – GOST Revisited -- Mixed Bases for Efficient Inversion in and Conversion Matrices of SubBytes of AES -- SHA-3 -- Developing a Hardware Evaluation Method for SHA-3 Candidates -- Fair and Comprehensive Methodology for Comparing Hardware Performance of Fourteen Round Two SHA-3 Candidates Using FPGAs -- Performance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures -- XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework -- Fault Attacks and Countermeasures -- Public Key Perturbation of Randomized RSA Implementations -- Fault Sensitivity Analysis -- PUFs and RNGs -- An Alternative to Error Correction for SRAM-Like PUFs -- New High Entropy Element for FPGA Based True Random Number Generators -- The Glitch PUF: A New Delay-PUF Architecture Exploiting Glitch Shapes -- New Designs -- Garbled Circuits for Leakage-Resilience: Hardware Implementation and Evaluation of One-Time Programs -- ARMADILLO: A Multi-purpose Cryptographic Primitive Dedicated to Hardware -- Side-Channel Attacks and Countermeasures II -- Provably Secure Higher-Order Masking of AES -- Algebraic Side-Channel Analysis in the Presence of Errors -- Coordinate Blinding over Large Prime Fields. |
| Altri titoli varianti | CHES 2010 |
| Record Nr. | UNINA-9910484204303321 |
| Berlin, : Springer, 2010 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||
Smart card research and advanced applications : 8th IFIP WG 8.8/11.2 international conference, CARDIS 2008, London, UK, September 8-11, 2008 ; proceedings / / Gilles Grimaud, François-Xavier Standaert, Editors
| Smart card research and advanced applications : 8th IFIP WG 8.8/11.2 international conference, CARDIS 2008, London, UK, September 8-11, 2008 ; proceedings / / Gilles Grimaud, François-Xavier Standaert, Editors |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Germany ; ; New York, New York : , : Springer, , [2008] |
| Descrizione fisica | 1 online resource (X, 295 p.) |
| Disciplina | 004.56 |
| Collana | Security and Cryptology |
| Soggetto topico | Smart cards |
| ISBN | 3-540-85893-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Malicious Code on Java Card Smartcards: Attacks and Countermeasures -- Static Program Analysis for Java Card Applets -- On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards -- New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough -- DSA Signature Scheme Immune to the Fault Cryptanalysis -- A Black Hen Lays White Eggs -- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents -- Fast Hash-Based Signatures on Constrained Devices -- Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence -- The Trusted Execution Module: Commodity General-Purpose Trusted Computing -- Management of Multiple Cards in NFC-Devices -- Coupon Recalculation for the GPS Authentication Scheme -- Provably Secure Grouping-Proofs for RFID Tags -- Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices -- A Practical DPA Countermeasure with BDD Architecture -- SCARE of an Unknown Hardware Feistel Implementation -- Evaluation of Java Card Performance -- Application of Network Smart Cards to Citizens Identification Systems -- SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow -- A Practical Attack on the MIFARE Classic -- A Chemical Memory Snapshot -- Recent Advances in Electronic Cash Design. |
| Record Nr. | UNISA-996465287003316 |
| Berlin, Germany ; ; New York, New York : , : Springer, , [2008] | ||
| Lo trovi qui: Univ. di Salerno | ||
| ||
Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings / / edited by Gilles Grimaud, François-Xavier Standaert
| Smart Card Research and Advanced Applications : 8th IFIP WG 8.8/11.2 International Conference, CARDIS 2008, London, UK, September 8-11, 2008, Proceedings / / edited by Gilles Grimaud, François-Xavier Standaert |
| Edizione | [1st ed. 2008.] |
| Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 |
| Descrizione fisica | 1 online resource (X, 295 p.) |
| Disciplina | 004.56 |
| Collana | Security and Cryptology |
| Soggetto topico |
Cryptography
Data encryption (Computer science) Electronics Electronic data processing - Management Computers and civilization Computer networks Data protection Cryptology Electronics and Microelectronics, Instrumentation IT Operations Computers and Society Computer Communication Networks Data and Information Security |
| ISBN | 3-540-85893-8 |
| Formato | Materiale a stampa |
| Livello bibliografico | Monografia |
| Lingua di pubblicazione | eng |
| Nota di contenuto | Malicious Code on Java Card Smartcards: Attacks and Countermeasures -- Static Program Analysis for Java Card Applets -- On Practical Information Flow Policies for Java-Enabled Multiapplication Smart Cards -- New Differential Fault Analysis on AES Key Schedule: Two Faults Are Enough -- DSA Signature Scheme Immune to the Fault Cryptanalysis -- A Black Hen Lays White Eggs -- Ultra-Lightweight Implementations for Smart Devices – Security for 1000 Gate Equivalents -- Fast Hash-Based Signatures on Constrained Devices -- Fraud Detection and Prevention in Smart Card Based Environments Using Artificial Intelligence -- The Trusted Execution Module: Commodity General-Purpose Trusted Computing -- Management of Multiple Cards in NFC-Devices -- Coupon Recalculation for the GPS Authentication Scheme -- Provably Secure Grouping-Proofs for RFID Tags -- Secure Implementation of the Stern Authentication and Signature Schemes for Low-Resource Devices -- A Practical DPA Countermeasure with BDD Architecture -- SCARE of an Unknown Hardware Feistel Implementation -- Evaluation of Java Card Performance -- Application of Network Smart Cards to Citizens Identification Systems -- SmartPro: A Smart Card Based Digital Content Protection for Professional Workflow -- A Practical Attack on the MIFARE Classic -- A Chemical Memory Snapshot -- Recent Advances in Electronic Cash Design. |
| Record Nr. | UNINA-9910483877703321 |
| Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2008 | ||
| Lo trovi qui: Univ. Federico II | ||
| ||