top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Group theoretic cryptography / / Maria Isabel Gonzalez Vasco, Universidad Rey Juan Carlos, Madrid, Spain, Rainer Steinwandt, Florida Atlantic University, Boca Raton, FL
Group theoretic cryptography / / Maria Isabel Gonzalez Vasco, Universidad Rey Juan Carlos, Madrid, Spain, Rainer Steinwandt, Florida Atlantic University, Boca Raton, FL
Autore González Vasco Maria Isabel
Pubbl/distr/stampa Boca Raton, Florida : , : CRC Press, , [2015]
Descrizione fisica 1 online resource (244 p.)
Disciplina 005.82
Collana Chapman and Hall/CRC Cryptography and Network Security
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks - Security measures
ISBN 0-429-13660-9
1-4665-2723-4
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Dedication; Contents; List of Figures; Symbol Description; Preface; Part I: Preliminaries; Chapter 1: Mathematical background; Chapter 2: Basics on complexity; Chapter 3: Cryptology: An introduction; Part II: Public-Key Encryption; Chapter 4: Provable security guarantees; Chapter 5: Public-key encryption in the standard model; Chapter 6: Public-key encryption using infinite groups; Part III: Secret-Key Encryption; Chapter 7: Block ciphers; Chapter 8: Cryptographic hash functions and message authentication codes; Part IV: Other Cryptographic Constructions
Chapter 9: Key establishment protocolsChapter 10: Signature and identification schemes; Part V: Appendix; Appendix A: Solutions to selected exercises; References
Record Nr. UNINA-9910788023603321
González Vasco Maria Isabel  
Boca Raton, Florida : , : CRC Press, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Group theoretic cryptography / / Maria Isabel Gonzalez Vasco, Universidad Rey Juan Carlos, Madrid, Spain, Rainer Steinwandt, Florida Atlantic University, Boca Raton, FL
Group theoretic cryptography / / Maria Isabel Gonzalez Vasco, Universidad Rey Juan Carlos, Madrid, Spain, Rainer Steinwandt, Florida Atlantic University, Boca Raton, FL
Autore González Vasco Maria Isabel
Edizione [1st ed.]
Pubbl/distr/stampa Boca Raton, Florida : , : CRC Press, , [2015]
Descrizione fisica 1 online resource (244 p.)
Disciplina 005.82
005.8
Collana Chapman and Hall/CRC Cryptography and Network Security
Soggetto topico Cryptography
Data encryption (Computer science)
Computer networks - Security measures
ISBN 9781040068472
1040068472
9780429136603
0429136609
9781466527232
1466527234
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cover; Dedication; Contents; List of Figures; Symbol Description; Preface; Part I: Preliminaries; Chapter 1: Mathematical background; Chapter 2: Basics on complexity; Chapter 3: Cryptology: An introduction; Part II: Public-Key Encryption; Chapter 4: Provable security guarantees; Chapter 5: Public-key encryption in the standard model; Chapter 6: Public-key encryption using infinite groups; Part III: Secret-Key Encryption; Chapter 7: Block ciphers; Chapter 8: Cryptographic hash functions and message authentication codes; Part IV: Other Cryptographic Constructions
Chapter 9: Key establishment protocolsChapter 10: Signature and identification schemes; Part V: Appendix; Appendix A: Solutions to selected exercises; References
Record Nr. UNINA-9910961005003321
González Vasco Maria Isabel  
Boca Raton, Florida : , : CRC Press, , [2015]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography [[electronic resource] ] : 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers / / edited by Jintai Ding, Rainer Steinwandt
Post-Quantum Cryptography [[electronic resource] ] : 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers / / edited by Jintai Ding, Rainer Steinwandt
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 418 p. 581 illus., 18 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data protection
Computers
Computer organization
Cryptology
Security
Computing Milieux
Computer Systems Organization and Communication Networks
ISBN 3-030-25510-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.
Record Nr. UNISA-996466183003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography : 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers / / edited by Jintai Ding, Rainer Steinwandt
Post-Quantum Cryptography : 10th International Conference, PQCrypto 2019, Chongqing, China, May 8–10, 2019 Revised Selected Papers / / edited by Jintai Ding, Rainer Steinwandt
Edizione [1st ed. 2019.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Descrizione fisica 1 online resource (XIII, 418 p. 581 illus., 18 illus. in color.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Data protection
Computers
Computer organization
Cryptology
Security
Computing Milieux
Computer Systems Organization and Communication Networks
ISBN 3-030-25510-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Finding closest lattice vectors using approximate Voronoi cells -- Evaluating the Potential for Hardware Acceleration of Four NTRU Based Key Encapsulation Mechanisms Using Software/Hardware Codesign -- Forward-Secure Group Signatures from Lattices -- Towards Practical Microcontroller Implementation of the Signature Scheme Falcon -- Round5: Compact and Fast Post-Quantum Public-Key Encryption -- The impact of error dependencies on Ring/Mod-LWE/LWR based schemes -- Direct CCA-Secure KEM and Deterministic PKE from Plain LWE -- Recovering short secret keys of RLCE in polynomial time -- Cryptanalysis of an NTRU-based Proxy Encryption Scheme from ASIACCS'15 -- On the Complexity of Superdetermined Minrank Instances -- Constant-Round Group Key Exchange from the Ring-RLWE Assumption -- Hybrid Key Encapsulation Mechanisms and Authenticated Key Exchange -- Tighter security proofs for generic key encapsulation mechanism in the quantum random oracle model -- (Tightly) QCCA-Secure Key-Encapsulation Mechanism in the Quantum Random Oracle Model -- Faster SeaSign signatures through improved rejection sampling -- Thomas Decru, Lorenz Panny, and Frederik Vercauteren Genus Two Isogeny Cryptography -- On Lions and Elligators: An efficient constant-time implementation of CSIDH -- Quantum security of hash functions and property-preservation of iterated hashing -- Improved Quantum Multicollision-Finding Algorithm -- Preventing timing attacks against RQC using constant time decoding of Gabidulin codes -- A traceable ring signature scheme based on coding theory -- On the Decoding Failure Rate of QC-MDPC Bit-Flipping Decoders.
Record Nr. UNINA-9910349311503321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2019
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography [[electronic resource] ] : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Post-Quantum Cryptography [[electronic resource] ] : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 529 p. 59 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Coding theory
Information theory
Logic design
Cryptology
Software Engineering/Programming and Operating Systems
Coding and Information Theory
Logic Design
ISBN 3-319-79063-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Code-based Cryptography -- Cryptanalysis -- Hash-based Cryptography -- Isogenies in Cryptography -- Lattice-based Cryptography -- Multivariate Cryptography -- Protocols -- Quantum Algorithms.
Record Nr. UNISA-996465611003316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Post-Quantum Cryptography : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Post-Quantum Cryptography : 9th International Conference, PQCrypto 2018, Fort Lauderdale, FL, USA, April 9-11, 2018, Proceedings / / edited by Tanja Lange, Rainer Steinwandt
Edizione [1st ed. 2018.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Descrizione fisica 1 online resource (XIII, 529 p. 59 illus.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Software engineering
Coding theory
Information theory
Logic design
Cryptology
Software Engineering/Programming and Operating Systems
Coding and Information Theory
Logic Design
ISBN 9783319790633
3319790633
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Code-based Cryptography -- Cryptanalysis -- Hash-based Cryptography -- Isogenies in Cryptography -- Lattice-based Cryptography -- Multivariate Cryptography -- Protocols -- Quantum Algorithms.
Record Nr. UNINA-9910349423903321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui