top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / / Bart Preneel, Stafford Tavares (eds.)
Selected areas in cryptography : 12th international workshop, SAC 2005, Kingston, ON, Canada, August 11-12, 2005 : revised selected papers / / Bart Preneel, Stafford Tavares (eds.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2006
Descrizione fisica 1 online resource (XI, 371 p.)
Disciplina 005.8/2
Altri autori (Persone) PreneelBart <1963->
TavaresStafford <1940->
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Cryptography
Computer security
Data encryption (Computer science)
ISBN 3-540-33109-3
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Stream Ciphers I -- Conditional Estimators: An Effective Attack on A5/1 -- Cryptanalysis of the F-FCSR Stream Cipher Family -- Fault Attacks on Combiners with Memory -- Block Ciphers -- New Observation on Camellia -- Proving the Security of AES Substitution-Permutation Network -- Modes of Operation -- An Attack on CFB Mode Encryption as Used by OpenPGP -- Parallelizable Authentication Trees -- Improved Time-Memory Trade-Offs with Multiple Data -- Public Key Cryptography -- A Space Efficient Backdoor in RSA and Its Applications -- An Efficient Public Key Cryptosystem with a Privacy Enhanced Double Decryption Mechanism -- Stream Ciphers II -- On the (Im)Possibility of Practical and Secure Nonlinear Filters and Combiners -- Rekeying Issues in the MUGI Stream Cipher -- Key Establishment Protocols and Access Control -- Tree-Based Key Distribution Patterns -- Provably Secure Tripartite Password Protected Key Exchange Protocol Based on Elliptic Curves -- An Access Control Scheme for Partially Ordered Set Hierarchy with Provable Security -- Hash Functions -- Breaking a New Hash Function Design Strategy Called SMASH -- Analysis of a SHA-256 Variant -- Impact of Rotations in SHA-1 and Related Hash Functions -- Protocols for RFID Tags -- A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags -- Reducing Time Complexity in RFID Systems -- Efficient Implementations -- Accelerated Verification of ECDSA Signatures -- Pairing-Friendly Elliptic Curves of Prime Order -- Minimality of the Hamming Weight of the ?-NAF for Koblitz Curves and Improved Combination with Point Halving -- SPA Resistant Left-to-Right Integer Recodings -- Efficient FPGA-Based Karatsuba Multipliers for Polynomials over .
Altri titoli varianti SAC 2005
Record Nr. UNINA-9910484328403321
Berlin ; ; New York, : Springer, c2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected areas in cryptography : 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings / / Stafford Tavares, Henk Meijer (editors)
Selected areas in cryptography : 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings / / Stafford Tavares, Henk Meijer (editors)
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1999]
Descrizione fisica 1 online resource (X, 386 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-540-48892-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Design of Secret Key Cryptosystems -- Feistel Ciphers with L 2-Decorrelation -- Key-Dependent S-Box Manipulations -- On the Twofish Key Schedule -- Towards Provable Security of Substitution-Permutation Encryption Networks -- Randomness and Computational Issues -- An Accurate Evaluation of Maurer’s Universal Test -- Computational Alternatives to Random Number Generators -- Storage-Efficient Finite Field Basis Conversion -- Verifiable Partial Sharing of Integer Factors -- Analysis of Secret Key Cryptosystems -- Higher Order Differential Attack Using Chosen Higher Order Differences -- On Maximum Non-averaged Differential Probability -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast Encryption -- Mix-Based Electronic Payments -- Over the Air Service Provisioning -- Public Key Cryptosystems -- Faster Attacks on Elliptic Curve Cryptosystems -- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n) -- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97 -- A Lattice- Based Public-Key Cryptosystem -- Design and Implementation of Secret Key Cryptosystems -- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine -- IDEA: A Cipher for Multimedia Architectures? -- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis -- The Nonhomomorphicity of Boolean Functions -- Attacks on Secret Key Cryptosystems -- Cryptanalysis of ORYX -- A Timing Attack on RC5 -- Cryptanalysis of SPEED -- Invited Talks -- Authenticated Diffe-Hellman Key Agreement Protocols -- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Record Nr. UNINA-9910143473203321
Berlin, Heidelberg : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Selected areas in cryptography : 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings / / Stafford Tavares, Henk Meijer (editors)
Selected areas in cryptography : 5th annual international workshop, SAC'98, Kingston, Ontario, Canada, August 17-18, 1998, proceedings / / Stafford Tavares, Henk Meijer (editors)
Edizione [1st ed. 1999.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1999]
Descrizione fisica 1 online resource (X, 386 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Data encryption (Computer science)
ISBN 3-540-48892-8
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Design of Secret Key Cryptosystems -- Feistel Ciphers with L 2-Decorrelation -- Key-Dependent S-Box Manipulations -- On the Twofish Key Schedule -- Towards Provable Security of Substitution-Permutation Encryption Networks -- Randomness and Computational Issues -- An Accurate Evaluation of Maurer’s Universal Test -- Computational Alternatives to Random Number Generators -- Storage-Efficient Finite Field Basis Conversion -- Verifiable Partial Sharing of Integer Factors -- Analysis of Secret Key Cryptosystems -- Higher Order Differential Attack Using Chosen Higher Order Differences -- On Maximum Non-averaged Differential Probability -- Cryptanalysis of RC4-like Ciphers -- Cryptographic Systems -- Key Preassigned Traceability Schemes for Broadcast Encryption -- Mix-Based Electronic Payments -- Over the Air Service Provisioning -- Public Key Cryptosystems -- Faster Attacks on Elliptic Curve Cryptosystems -- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n) -- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97 -- A Lattice- Based Public-Key Cryptosystem -- Design and Implementation of Secret Key Cryptosystems -- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine -- IDEA: A Cipher for Multimedia Architectures? -- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis -- The Nonhomomorphicity of Boolean Functions -- Attacks on Secret Key Cryptosystems -- Cryptanalysis of ORYX -- A Timing Attack on RC5 -- Cryptanalysis of SPEED -- Invited Talks -- Authenticated Diffe-Hellman Key Agreement Protocols -- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Record Nr. UNISA-996466125503316
Berlin, Heidelberg : , : Springer, , [1999]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui