Advances in Cryptology - EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006 : proceedings / / Serge Vaudenay (ed.) |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, : Springer, 2006 |
Descrizione fisica | 1 online resource (XIV, 622 p.) |
Disciplina | 005.82 |
Altri autori (Persone) | VaudenaySerge |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computers - Access control
Cryptography Data transmission systems - Security measures |
ISBN | 3-540-34547-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory and Practice: The Case of Encryption in IPsec -- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects -- Invited Talk I -- Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt -- Cryptography Meets Humans -- Hiding Secret Points Amidst Chaff -- Parallel and Concurrent Security of the HB and HB?+? Protocols -- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol -- Stream Ciphers -- QUAD: A Practical Stream Cipher with Provable Security -- How to Strengthen Pseudo-random Generators by Using Compression -- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks -- Hash Functions -- VSH, an Efficient and Provable Collision-Resistant Hash Function -- Herding Hash Functions and the Nostradamus Attack -- Oblivious Transfer -- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing -- Oblivious Transfer Is Symmetric -- Numbers and Lattices -- Symplectic Lattice Reduction and NTRU -- The Function Field Sieve in the Medium Prime Case -- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures -- Foundations -- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model -- Private Circuits II: Keeping Secrets in Tamperable Circuits -- Composition Implies Adaptive Security in Minicrypt -- Perfect Non-interactive Zero Knowledge for NP -- Invited Talk II -- Language Modeling and Encryption on Packet Switched Networks -- Block Ciphers -- A Provable-Security Treatment of the Key-Wrap Problem -- Luby-Rackoff Ciphers from Weak Round Functions? -- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs -- Cryptography Without Random Oracles -- Compact Group Signatures Without Random Oracles -- Practical Identity-Based Encryption Without Random Oracles -- Sequential Aggregate Signatures and Multisignatures Without Random Oracles -- Multiparty Computation -- Our Data, Ourselves: Privacy Via Distributed Noise Generation -- On the (Im-)Possibility of Extending Coin Toss -- Efficient Binary Conversion for Paillier Encrypted Values -- Information-Theoretic Conditions for Two-Party Secure Function Evaluation -- Cryptography for Groups -- Unclonable Group Identification -- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys -- Simplified Threshold RSA with Adaptive and Proactive Security. |
Altri titoli varianti | EUROCRYPT 2006 |
Record Nr. | UNINA-9910484766303321 |
Berlin, : Springer, 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Advances in Cryptology – EUROCRYPT 2006 [[electronic resource] ] : 25th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings / / edited by Serge Vaudenay |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XIV, 622 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer communication systems Operating systems (Computers) Algorithms Computer science—Mathematics Management information systems Computer science Cryptology Computer Communication Networks Operating Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science Management of Computing and Information Systems |
ISBN | 3-540-34547-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory and Practice: The Case of Encryption in IPsec -- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects -- Invited Talk I -- Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt -- Cryptography Meets Humans -- Hiding Secret Points Amidst Chaff -- Parallel and Concurrent Security of the HB and HB?+? Protocols -- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol -- Stream Ciphers -- QUAD: A Practical Stream Cipher with Provable Security -- How to Strengthen Pseudo-random Generators by Using Compression -- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks -- Hash Functions -- VSH, an Efficient and Provable Collision-Resistant Hash Function -- Herding Hash Functions and the Nostradamus Attack -- Oblivious Transfer -- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing -- Oblivious Transfer Is Symmetric -- Numbers and Lattices -- Symplectic Lattice Reduction and NTRU -- The Function Field Sieve in the Medium Prime Case -- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures -- Foundations -- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model -- Private Circuits II: Keeping Secrets in Tamperable Circuits -- Composition Implies Adaptive Security in Minicrypt -- Perfect Non-interactive Zero Knowledge for NP -- Invited Talk II -- Language Modeling and Encryption on Packet Switched Networks -- Block Ciphers -- A Provable-Security Treatment of the Key-Wrap Problem -- Luby-Rackoff Ciphers from Weak Round Functions? -- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs -- Cryptography Without Random Oracles -- Compact Group Signatures Without Random Oracles -- Practical Identity-Based Encryption Without Random Oracles -- Sequential Aggregate Signatures and Multisignatures Without Random Oracles -- Multiparty Computation -- Our Data, Ourselves: Privacy Via Distributed Noise Generation -- On the (Im-)Possibility of Extending Coin Toss -- Efficient Binary Conversion for Paillier Encrypted Values -- Information-Theoretic Conditions for Two-Party Secure Function Evaluation -- Cryptography for Groups -- Unclonable Group Identification -- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys -- Simplified Threshold RSA with Adaptive and Proactive Security. |
Record Nr. | UNISA-996465571603316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security [[electronic resource] ] : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings / / edited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 586 p. 127 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computers Systems and Data Security Cryptology Theory of Computation |
ISBN | 3-319-07536-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation. |
Record Nr. | UNISA-996199998103316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Applied Cryptography and Network Security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings / / edited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay |
Edizione | [1st ed. 2014.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 |
Descrizione fisica | 1 online resource (XVIII, 586 p. 127 illus.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Computer security
Data encryption (Computer science) Computers Systems and Data Security Cryptology Theory of Computation |
ISBN | 3-319-07536-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Key exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation. |
Record Nr. | UNINA-9910483297303321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and network security : 19th international conference, CANS 2020, Vienna, Austria, December 14-16, 2020, proceedings / / Stephan Krenn, Haya Shulman, Serge Vaudenay (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIII, 634 p. 160 illus., 56 illus. in color.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico | Data encryption (Computer science) |
ISBN | 3-030-65411-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy-Enhancing Tools -- Lightweight Cryptography -- Codes and Lattices. |
Record Nr. | UNINA-9910447250103321 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Cryptology and network security : 19th international conference, CANS 2020, Vienna, Austria, December 14-16, 2020, proceedings / / Stephan Krenn, Haya Shulman, Serge Vaudenay (editors) |
Edizione | [1st ed. 2020.] |
Pubbl/distr/stampa | Cham, Switzerland : , : Springer, , [2020] |
Descrizione fisica | 1 online resource (XIII, 634 p. 160 illus., 56 illus. in color.) |
Disciplina | 005.82 |
Collana | Lecture notes in computer science |
Soggetto topico | Data encryption (Computer science) |
ISBN | 3-030-65411-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy-Enhancing Tools -- Lightweight Cryptography -- Codes and Lattices. |
Record Nr. | UNISA-996418219603316 |
Cham, Switzerland : , : Springer, , [2020] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Fast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings / / Serge Vaudenay (editor) |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (VIII, 297 p.) |
Disciplina | 004 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer science |
ISBN | 3-540-69710-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF. |
Record Nr. | UNISA-996466125003316 |
Berlin, Heidelberg : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Fast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings / / Serge Vaudenay (editor) |
Edizione | [1st ed. 1998.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer, , [1998] |
Descrizione fisica | 1 online resource (VIII, 297 p.) |
Disciplina | 004 |
Collana | Lecture Notes in Computer Science |
Soggetto topico | Computer science |
ISBN | 3-540-69710-1 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF. |
Record Nr. | UNINA-9910767529903321 |
Berlin, Heidelberg : , : Springer, , [1998] | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in cryptology : AFRICACRYPT 2009 :second international conference on cryptology in Africa, Gammarth, Tunisia, June 21-15, 2009 : proceedings / / Serge Vaudenay (ed.) |
Edizione | [1st ed. 2009.] |
Pubbl/distr/stampa | Berlin ; ; Heidelberg, : Springer, c2009 |
Descrizione fisica | 1 online resource (XI, 435 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | VaudenaySerge |
Collana | Lecture notes in computer science |
Soggetto topico |
Computer security
Computers - Access control Cryptography |
ISBN | 3-642-02384-3 |
Classificazione |
DAT 465f
SS 4800 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Hash Functions -- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL -- Cryptanalysis of Vortex -- Two Passes of Tiger Are Not One-Way -- Block Ciphers -- Generic Attacks on Feistel Networks with Internal Permutations -- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks -- Asymmetric Encryption -- Reducing Key Length of the McEliece Cryptosystem -- Cryptanalysis of RSA Using the Ratio of the Primes -- Digital Signatures -- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes -- A Schnorr-Like Lightweight Identity-Based Signature Scheme -- On the Theoretical Gap between Group Signatures with and without Unlinkability -- Practical Threshold Signatures with Linear Secret Sharing Schemes -- Asymmetric Encryption and Anonymity -- Certified Encryption Revisited -- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems -- Anonymity from Public Key Encryption to Undeniable Signatures -- Key Agreement Protocols -- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps -- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness -- Cryptographic Protocols -- Unifying Zero-Knowledge Proofs of Knowledge -- Co-sound Zero-Knowledge with Public Keys -- Another Look at Extended Private Information Retrieval Protocols -- Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions -- Efficient Implementations -- Exponent Recoding and Regular Exponentiation Algorithms -- Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware -- Fast Elliptic-Curve Cryptography on the Cell Broadband Engine -- On Modular Decomposition of Integers -- Implementation Attacks -- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed -- An Improved Fault Based Attack of the Advanced Encryption Standard. |
Record Nr. | UNINA-9910484591603321 |
Berlin ; ; Heidelberg, : Springer, c2009 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Progress in cryptology : AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008 : proceedings / / Serge Vaudenay (ed.) |
Edizione | [1st ed. 2008.] |
Pubbl/distr/stampa | Berlin ; ; New York, : Springer, c2008 |
Descrizione fisica | 1 online resource (XI, 420 p.) |
Disciplina | 005.8 |
Altri autori (Persone) | VaudenaySerge |
Collana |
Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology |
Soggetto topico |
Computer security
Computers - Access control Cryptography |
ISBN | 3-540-68164-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | AES -- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds -- Implementation of the AES-128 on Virtex-5 FPGAs -- Analysis of RFID Protocols -- Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol -- Differential Cryptanalysis of Reduced-Round PRESENT -- Invited Talk -- The Psychology of Security -- Cryptographic Protocols -- An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees -- Robust Threshold Schemes Based on the Chinese Remainder Theorem -- An Authentication Protocol with Encrypted Biometric Data -- Authentication -- Authenticated Encryption Mode for Beyond the Birthday Bound Security -- Cryptanalysis of the TRMS Signature Scheme of PKC’05 -- Public-Key Cryptography -- New Definition of Density on Knapsack Cryptosystems -- Another Generalization of Wiener’s Attack on RSA -- An Adaptation of the NICE Cryptosystem to Real Quadratic Orders -- Pseudorandomness -- A Proof of Security in O(2 n ) for the Benes Scheme -- Analysis of Stream Ciphers -- Yet Another Attack on Vest -- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers -- Correlated Keystreams in Moustique -- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State -- Analysis of Grain’s Initialization Algorithm -- Hash Functions -- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function -- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? -- Broadcast Encryption -- Attribute-Based Broadcast Encryption Scheme Made Efficient -- Lower Bounds for Subset Cover Based Broadcast Encryption -- Invited Talk -- A Brief History of Provably-Secure Public-Key Encryption -- Implementation -- On Compressible Pairings and Their Computation -- Twisted Edwards Curves -- Efficient Multiplication in , m???1 and 5???????18. |
Altri titoli varianti |
International Conference on Cryptology in Africa
AFRICACRYPT 2008 First International Conference on Cryptology in Africa |
Record Nr. | UNINA-9910483457903321 |
Berlin ; ; New York, : Springer, c2008 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|