top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology - EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006 : proceedings / / Serge Vaudenay (ed.)
Advances in Cryptology - EUROCRYPT 2006 : 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006 : proceedings / / Serge Vaudenay (ed.)
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, : Springer, 2006
Descrizione fisica 1 online resource (XIV, 622 p.)
Disciplina 005.82
Altri autori (Persone) VaudenaySerge
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computers - Access control
Cryptography
Data transmission systems - Security measures
ISBN 3-540-34547-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory and Practice: The Case of Encryption in IPsec -- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects -- Invited Talk I -- Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt -- Cryptography Meets Humans -- Hiding Secret Points Amidst Chaff -- Parallel and Concurrent Security of the HB and HB?+? Protocols -- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol -- Stream Ciphers -- QUAD: A Practical Stream Cipher with Provable Security -- How to Strengthen Pseudo-random Generators by Using Compression -- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks -- Hash Functions -- VSH, an Efficient and Provable Collision-Resistant Hash Function -- Herding Hash Functions and the Nostradamus Attack -- Oblivious Transfer -- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing -- Oblivious Transfer Is Symmetric -- Numbers and Lattices -- Symplectic Lattice Reduction and NTRU -- The Function Field Sieve in the Medium Prime Case -- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures -- Foundations -- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model -- Private Circuits II: Keeping Secrets in Tamperable Circuits -- Composition Implies Adaptive Security in Minicrypt -- Perfect Non-interactive Zero Knowledge for NP -- Invited Talk II -- Language Modeling and Encryption on Packet Switched Networks -- Block Ciphers -- A Provable-Security Treatment of the Key-Wrap Problem -- Luby-Rackoff Ciphers from Weak Round Functions? -- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs -- Cryptography Without Random Oracles -- Compact Group Signatures Without Random Oracles -- Practical Identity-Based Encryption Without Random Oracles -- Sequential Aggregate Signatures and Multisignatures Without Random Oracles -- Multiparty Computation -- Our Data, Ourselves: Privacy Via Distributed Noise Generation -- On the (Im-)Possibility of Extending Coin Toss -- Efficient Binary Conversion for Paillier Encrypted Values -- Information-Theoretic Conditions for Two-Party Secure Function Evaluation -- Cryptography for Groups -- Unclonable Group Identification -- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys -- Simplified Threshold RSA with Adaptive and Proactive Security.
Altri titoli varianti EUROCRYPT 2006
Record Nr. UNINA-9910484766303321
Berlin, : Springer, 2006
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology – EUROCRYPT 2006 [[electronic resource] ] : 25th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings / / edited by Serge Vaudenay
Advances in Cryptology – EUROCRYPT 2006 [[electronic resource] ] : 25th International Conference on the Theory and Applications of Cryptographic Techniques, St. Petersburg, Russia, May 28 - June 1, 2006, Proceedings / / edited by Serge Vaudenay
Edizione [1st ed. 2006.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Descrizione fisica 1 online resource (XIV, 622 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
ISBN 3-540-34547-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis -- Security Analysis of the Strong Diffie-Hellman Problem -- Cryptography in Theory and Practice: The Case of Encryption in IPsec -- Polynomial Equivalence Problems: Algorithmic and Theoretical Aspects -- Invited Talk I -- Alien vs. Quine, the Vanishing Circuit and Other Tales from the Industry’s Crypt -- Cryptography Meets Humans -- Hiding Secret Points Amidst Chaff -- Parallel and Concurrent Security of the HB and HB?+? Protocols -- Polling with Physical Envelopes: A Rigorous Analysis of a Human-Centric Protocol -- Stream Ciphers -- QUAD: A Practical Stream Cipher with Provable Security -- How to Strengthen Pseudo-random Generators by Using Compression -- Efficient Computation of Algebraic Immunity for Algebraic and Fast Algebraic Attacks -- Hash Functions -- VSH, an Efficient and Provable Collision-Resistant Hash Function -- Herding Hash Functions and the Nostradamus Attack -- Oblivious Transfer -- Optimal Reductions Between Oblivious Transfers Using Interactive Hashing -- Oblivious Transfer Is Symmetric -- Numbers and Lattices -- Symplectic Lattice Reduction and NTRU -- The Function Field Sieve in the Medium Prime Case -- Learning a Parallelepiped: Cryptanalysis of GGH and NTRU Signatures -- Foundations -- The Cramer-Shoup Encryption Scheme Is Plaintext Aware in the Standard Model -- Private Circuits II: Keeping Secrets in Tamperable Circuits -- Composition Implies Adaptive Security in Minicrypt -- Perfect Non-interactive Zero Knowledge for NP -- Invited Talk II -- Language Modeling and Encryption on Packet Switched Networks -- Block Ciphers -- A Provable-Security Treatment of the Key-Wrap Problem -- Luby-Rackoff Ciphers from Weak Round Functions? -- The Security of Triple Encryption and a Framework for Code-Based Game-Playing Proofs -- Cryptography Without Random Oracles -- Compact Group Signatures Without Random Oracles -- Practical Identity-Based Encryption Without Random Oracles -- Sequential Aggregate Signatures and Multisignatures Without Random Oracles -- Multiparty Computation -- Our Data, Ourselves: Privacy Via Distributed Noise Generation -- On the (Im-)Possibility of Extending Coin Toss -- Efficient Binary Conversion for Paillier Encrypted Values -- Information-Theoretic Conditions for Two-Party Secure Function Evaluation -- Cryptography for Groups -- Unclonable Group Identification -- Fully Collusion Resistant Traitor Tracing with Short Ciphertexts and Private Keys -- Simplified Threshold RSA with Adaptive and Proactive Security.
Record Nr. UNISA-996465571603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security [[electronic resource] ] : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings / / edited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
Applied Cryptography and Network Security [[electronic resource] ] : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings / / edited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 586 p. 127 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computers
Systems and Data Security
Cryptology
Theory of Computation
ISBN 3-319-07536-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation.
Record Nr. UNISA-996199998103316
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Applied Cryptography and Network Security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings / / edited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
Applied Cryptography and Network Security : 12th International Conference, ACNS 2014, Lausanne, Switzerland, June 10-13, 2014. Proceedings / / edited by Ioana Boureanu, Philippe Owesarski, Serge Vaudenay
Edizione [1st ed. 2014.]
Pubbl/distr/stampa Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Descrizione fisica 1 online resource (XVIII, 586 p. 127 illus.)
Disciplina 005.8
Collana Security and Cryptology
Soggetto topico Computer security
Data encryption (Computer science)
Computers
Systems and Data Security
Cryptology
Theory of Computation
ISBN 3-319-07536-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key exchange -- Primitive construction -- Attacks (public-key cryptography) -- Hashing -- Cryptanalysis and attacks (symmetric cryptography) -- Network security -- Signatures -- System security.- Secure computation.
Record Nr. UNINA-9910483297303321
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2014
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and network security : 19th international conference, CANS 2020, Vienna, Austria, December 14-16, 2020, proceedings / / Stephan Krenn, Haya Shulman, Serge Vaudenay (editors)
Cryptology and network security : 19th international conference, CANS 2020, Vienna, Austria, December 14-16, 2020, proceedings / / Stephan Krenn, Haya Shulman, Serge Vaudenay (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIII, 634 p. 160 illus., 56 illus. in color.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
ISBN 3-030-65411-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy-Enhancing Tools -- Lightweight Cryptography -- Codes and Lattices.
Record Nr. UNINA-9910447250103321
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Cryptology and network security : 19th international conference, CANS 2020, Vienna, Austria, December 14-16, 2020, proceedings / / Stephan Krenn, Haya Shulman, Serge Vaudenay (editors)
Cryptology and network security : 19th international conference, CANS 2020, Vienna, Austria, December 14-16, 2020, proceedings / / Stephan Krenn, Haya Shulman, Serge Vaudenay (editors)
Edizione [1st ed. 2020.]
Pubbl/distr/stampa Cham, Switzerland : , : Springer, , [2020]
Descrizione fisica 1 online resource (XIII, 634 p. 160 illus., 56 illus. in color.)
Disciplina 005.82
Collana Lecture notes in computer science
Soggetto topico Data encryption (Computer science)
ISBN 3-030-65411-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Best Papers -- Cybersecurity -- Credentials -- Elliptic Curves -- Payment Systems -- Privacy-Enhancing Tools -- Lightweight Cryptography -- Codes and Lattices.
Record Nr. UNISA-996418219603316
Cham, Switzerland : , : Springer, , [2020]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Fast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings / / Serge Vaudenay (editor)
Fast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings / / Serge Vaudenay (editor)
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1998]
Descrizione fisica 1 online resource (VIII, 297 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computer science
ISBN 3-540-69710-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF.
Record Nr. UNISA-996466125003316
Berlin, Heidelberg : , : Springer, , [1998]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Fast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings / / Serge Vaudenay (editor)
Fast software encryption : 5th international workshop, FSE '98, Paris, France, March 23-25, 1998 : proceedings / / Serge Vaudenay (editor)
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer, , [1998]
Descrizione fisica 1 online resource (VIII, 297 p.)
Disciplina 004
Collana Lecture Notes in Computer Science
Soggetto topico Computer science
ISBN 3-540-69710-1
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Cryptanalysis I -- New Results in Linear Cryptanalysis of RC5 -- Higher Order Differential Attack of a CAST Cipher -- Cryptanalysis of TWOPRIME -- New Stream Ciphers -- JEROBOAM -- Fast Hashing and Stream Encryption with Panama -- Joint Hardware / Software Design of a Fast Stream Cipher -- Design Construction Analysis -- On the Security of the Hashing Scheme Based on SL 2 -- About Feistel Schemes with Six (or More) Rounds -- Monkey: Black-Box Symmetric Ciphers Designed for MONopolizing KEYs -- Hash Functions -- MRD Hashing -- New Constructions for Secure Hash Functions -- Pseudo-Random Generators -- Cryptanalytic Attacks on Pseudorandom Number Generators -- New Block Ciphers -- CS-Cipher -- On the Design and Security of RC2 -- Serpent: A New Block Cipher Proposal -- Modes of Operations -- Attacking Triple Encryption -- Cryptanalysis of Some Recently-Proposed Multiple Modes of Operation -- Cryptanalysis II -- Differential Cryptanalysis of the ICE Encryption Algorithm -- The First Two Rounds of MD4 are Not One-Way -- Differential Cryptanalysis of KHF.
Record Nr. UNINA-9910767529903321
Berlin, Heidelberg : , : Springer, , [1998]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in cryptology : AFRICACRYPT 2009 :second international conference on cryptology in Africa, Gammarth, Tunisia, June 21-15, 2009 : proceedings / / Serge Vaudenay (ed.)
Progress in cryptology : AFRICACRYPT 2009 :second international conference on cryptology in Africa, Gammarth, Tunisia, June 21-15, 2009 : proceedings / / Serge Vaudenay (ed.)
Edizione [1st ed. 2009.]
Pubbl/distr/stampa Berlin ; ; Heidelberg, : Springer, c2009
Descrizione fisica 1 online resource (XI, 435 p.)
Disciplina 005.8
Altri autori (Persone) VaudenaySerge
Collana Lecture notes in computer science
Soggetto topico Computer security
Computers - Access control
Cryptography
ISBN 3-642-02384-3
Classificazione DAT 465f
SS 4800
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Hash Functions -- Second Preimage Attack on 5-Pass HAVAL and Partial Key-Recovery Attack on HMAC/NMAC-5-Pass HAVAL -- Cryptanalysis of Vortex -- Two Passes of Tiger Are Not One-Way -- Block Ciphers -- Generic Attacks on Feistel Networks with Internal Permutations -- Distinguishers for Ciphers and Known Key Attack against Rijndael with Large Blocks -- Asymmetric Encryption -- Reducing Key Length of the McEliece Cryptosystem -- Cryptanalysis of RSA Using the Ratio of the Primes -- Digital Signatures -- New RSA-Based (Selectively) Convertible Undeniable Signature Schemes -- A Schnorr-Like Lightweight Identity-Based Signature Scheme -- On the Theoretical Gap between Group Signatures with and without Unlinkability -- Practical Threshold Signatures with Linear Secret Sharing Schemes -- Asymmetric Encryption and Anonymity -- Certified Encryption Revisited -- Threshold Attribute-Based Signatures and Their Application to Anonymous Credential Systems -- Anonymity from Public Key Encryption to Undeniable Signatures -- Key Agreement Protocols -- Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps -- Password-Authenticated Group Key Agreement with Adaptive Security and Contributiveness -- Cryptographic Protocols -- Unifying Zero-Knowledge Proofs of Knowledge -- Co-sound Zero-Knowledge with Public Keys -- Another Look at Extended Private Information Retrieval Protocols -- Constructing Universally Composable Oblivious Transfers from Double Trap-Door Encryptions -- Efficient Implementations -- Exponent Recoding and Regular Exponentiation Algorithms -- Efficient Acceleration of Asymmetric Cryptography on Graphics Hardware -- Fast Elliptic-Curve Cryptography on the Cell Broadband Engine -- On Modular Decomposition of Integers -- Implementation Attacks -- Breaking KeeLoq in a Flash: On Extracting Keys at Lightning Speed -- An Improved Fault Based Attack of the Advanced Encryption Standard.
Record Nr. UNINA-9910484591603321
Berlin ; ; Heidelberg, : Springer, c2009
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Progress in cryptology : AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008 : proceedings / / Serge Vaudenay (ed.)
Progress in cryptology : AFRICACRYPT 2008 : First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11-14, 2008 : proceedings / / Serge Vaudenay (ed.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; New York, : Springer, c2008
Descrizione fisica 1 online resource (XI, 420 p.)
Disciplina 005.8
Altri autori (Persone) VaudenaySerge
Collana Lecture notes in computer science
LNCS sublibrary. SL 4, Security and cryptology
Soggetto topico Computer security
Computers - Access control
Cryptography
ISBN 3-540-68164-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto AES -- Improving Integral Attacks Against Rijndael-256 Up to 9 Rounds -- Implementation of the AES-128 on Virtex-5 FPGAs -- Analysis of RFID Protocols -- Weaknesses in a Recent Ultra-Lightweight RFID Authentication Protocol -- Differential Cryptanalysis of Reduced-Round PRESENT -- Invited Talk -- The Psychology of Security -- Cryptographic Protocols -- An (Almost) Constant-Effort Solution-Verification Proof-of-Work Protocol Based on Merkle Trees -- Robust Threshold Schemes Based on the Chinese Remainder Theorem -- An Authentication Protocol with Encrypted Biometric Data -- Authentication -- Authenticated Encryption Mode for Beyond the Birthday Bound Security -- Cryptanalysis of the TRMS Signature Scheme of PKC’05 -- Public-Key Cryptography -- New Definition of Density on Knapsack Cryptosystems -- Another Generalization of Wiener’s Attack on RSA -- An Adaptation of the NICE Cryptosystem to Real Quadratic Orders -- Pseudorandomness -- A Proof of Security in O(2 n ) for the Benes Scheme -- Analysis of Stream Ciphers -- Yet Another Attack on Vest -- Chosen IV Statistical Analysis for Key Recovery Attacks on Stream Ciphers -- Correlated Keystreams in Moustique -- Stream Ciphers Using a Random Update Function: Study of the Entropy of the Inner State -- Analysis of Grain’s Initialization Algorithm -- Hash Functions -- Password Recovery on Challenge and Response: Impossible Differential Attack on Hash Function -- How (Not) to Efficiently Dither Blockcipher-Based Hash Functions? -- Broadcast Encryption -- Attribute-Based Broadcast Encryption Scheme Made Efficient -- Lower Bounds for Subset Cover Based Broadcast Encryption -- Invited Talk -- A Brief History of Provably-Secure Public-Key Encryption -- Implementation -- On Compressible Pairings and Their Computation -- Twisted Edwards Curves -- Efficient Multiplication in , m???1 and 5???????18.
Altri titoli varianti International Conference on Cryptology in Africa
AFRICACRYPT 2008
First International Conference on Cryptology in Africa
Record Nr. UNINA-9910483457903321
Berlin ; ; New York, : Springer, c2008
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui