top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Contemporary cryptography / / Rolf Oppliger
Contemporary cryptography / / Rolf Oppliger
Autore Oppliger Rolf
Pubbl/distr/stampa Boston : , : Artech House, , ©2005
Descrizione fisica 1 online resource (529 p.)
Disciplina 652/.8
Collana Artech House computer security series
Soggetto topico Cryptography
Computer security
ISBN 1-58053-643-3
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contemporary Cryptography; Contents vii; Foreword xv; Preface xix; References xxiii; Acknowledgments; Chapter 1 Introduction 1; Chapter 2 Cryptographic Systems 21; Chapter 3 Discrete Mathematics 47; Chapter 4 Probability Theory 103; Chapter 5 Information Theory 125; Chapter 6 Complexity Theory 141; Chapter 7 One-Way Functions 169; Chapter 8 Cryptographic Hash Functions 195; Chapter 9 Random Bit Generators 219; Chapter 10 Symmetric Encryption Systems 229; Chapter 11 Message Authentication Codes 291; Chapter 12 Pseudorandom Bit Generators 309; Chapter 13 Pseudorandom Functions 321
Chapter 14 Asymmetric Encryption Systems 333Chapter 15 Digital Signature Systems 369; Chapter 16 Key Establishment 405; Chapter 17 Entity Authentication 423; Chapter 18 Secure Multiparty Computation 442; Chapter 19 Key Management 451; Chapter 20 Conclusions 467; Chapter 21 Outlook 473; Appendix A Abbreviations and Acronyms 479; Appendix B Mathematical Notation 485; About the Author 491; Index 493
Record Nr. UNINA-9910784136203321
Oppliger Rolf  
Boston : , : Artech House, , ©2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Contemporary cryptography / / Rolf Oppliger
Contemporary cryptography / / Rolf Oppliger
Autore Oppliger Rolf
Pubbl/distr/stampa Boston : , : Artech House, , ©2005
Descrizione fisica 1 online resource (529 p.)
Disciplina 652/.8
Collana Artech House computer security series
Soggetto topico Cryptography
Computer security
ISBN 1-58053-643-3
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Contemporary Cryptography; Contents vii; Foreword xv; Preface xix; References xxiii; Acknowledgments; Chapter 1 Introduction 1; Chapter 2 Cryptographic Systems 21; Chapter 3 Discrete Mathematics 47; Chapter 4 Probability Theory 103; Chapter 5 Information Theory 125; Chapter 6 Complexity Theory 141; Chapter 7 One-Way Functions 169; Chapter 8 Cryptographic Hash Functions 195; Chapter 9 Random Bit Generators 219; Chapter 10 Symmetric Encryption Systems 229; Chapter 11 Message Authentication Codes 291; Chapter 12 Pseudorandom Bit Generators 309; Chapter 13 Pseudorandom Functions 321
Chapter 14 Asymmetric Encryption Systems 333Chapter 15 Digital Signature Systems 369; Chapter 16 Key Establishment 405; Chapter 17 Entity Authentication 423; Chapter 18 Secure Multiparty Computation 442; Chapter 19 Key Management 451; Chapter 20 Conclusions 467; Chapter 21 Outlook 473; Appendix A Abbreviations and Acronyms 479; Appendix B Mathematical Notation 485; About the Author 491; Index 493
Record Nr. UNINA-9910811346503321
Oppliger Rolf  
Boston : , : Artech House, , ©2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-88625-7
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity.
Record Nr. UNISA-996466243503316
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Information and communications security : 10th international conference, ICICS 2008 Birmingham, UK, October 20-22, 2008, proceedings / / Liqun Chen, Mark Ryan, Guilin Wang, editors
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Descrizione fisica 1 online resource (XIII, 436 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Computer security
Telecommunication systems - Security measures
ISBN 3-540-88625-7
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk -- Attestation: Evidence and Trust -- Authentication -- A Novel Solution for End-to-End Integrity Protection in Signed PGP Mail -- Unclonable Lightweight Authentication Scheme -- Threat Modelling in User Performed Authentication -- Access with Fast Batch Verifiable Anonymous Credentials -- Side Channel Analysis -- Quantifying Timing Leaks and Cost Optimisation -- Method for Detecting Vulnerability to Doubling Attacks -- Side Channel Analysis of Some Hash Based MACs: A Response to SHA-3 Requirements -- Cryptanalysis -- Key Recovery Attack on Stream Cipher Mir-1 Using a Key-Dependent S-Box -- Analysis of Two Attacks on Reduced-Round Versions of the SMS4 -- Applying Time-Memory-Data Trade-Off to Meet-in-the-Middle Attack -- Access Control -- Beyond User-to-User Access Control for Online Social Networks -- Revocation Schemes for Delegation Licences -- Reusability of Functionality-Based Application Confinement Policy Abstractions -- Towards Role Based Trust Management without Distributed Searching of Credentials -- Software Security -- BinHunt: Automatically Finding Semantic Differences in Binary Programs -- Enhancing Java ME Security Support with Resource Usage Monitoring -- Pseudo-randomness Inside Web Browsers -- System Security -- Verifiable and Revocable Expression of Consent to Processing of Aggregated Personal Data -- Embedding Renewable Cryptographic Keys into Continuous Noisy Data -- Automated Device Pairing for Asymmetric Pairing Scenarios -- Applied Cryptography -- Algebraic Description and Simultaneous Linear Approximations of Addition in Snow 2.0. -- Towards an Information Theoretic Analysis of Searchable Encryption -- A Bootstrap Attack on Digital Watermarks in the Frequency Domain -- Improved Data Hiding Technique for Shares in Extended Visual Secret Sharing Schemes -- Security Protocols -- Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval -- Specification of Electronic Voting Protocol Properties Using ADM Logic: FOO Case Study -- Publicly Verifiable Remote Data Integrity.
Record Nr. UNINA-9910484185803321
Berlin ; ; Heidelberg : , : Springer-Verlag, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Pairing-based cryptography - Pairing 2008 : second international conference, Egham, UK, September 1-3, 2008 ; proceedings / / Steven D. Galbraith, Kenneth G. Paterson (eds.)
Pairing-based cryptography - Pairing 2008 : second international conference, Egham, UK, September 1-3, 2008 ; proceedings / / Steven D. Galbraith, Kenneth G. Paterson (eds.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XI, 377 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Sets of pairs of functions to be distinguished
Cryptography
ISBN 3-540-85538-6
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Pairings in Trusted Computing -- Pairing Lattices -- The Uber-Assumption Family -- Cryptography I -- Homomorphic Encryption and Signatures from Vector Decomposition -- Hidden-Vector Encryption with Groups of Prime Order -- Mathematics -- The Hidden Root Problem -- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography -- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group -- Constructing Pairing Friendly Curves -- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field -- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials -- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties -- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2?=?x 5?+?ax -- Implementation of Pairings -- Integer Variable ?–Based Ate Pairing -- Pairing Computation on Twisted Edwards Form Elliptic Curves -- Exponentiation in Pairing-Friendly Groups Using Homomorphisms -- Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves -- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms -- Pairings on Hyperelliptic Curves with a Real Model -- Hardware Implementation -- Faster Implementation of ? T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition -- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and -- Cryptography II -- One-Round ID-Based Blind Signature Scheme without ROS Assumption -- Tracing Malicious Proxies in Proxy Re-encryption -- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Record Nr. UNINA-9910483733803321
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Pairing-based cryptography - Pairing 2008 : second international conference, Egham, UK, September 1-3, 2008 ; proceedings / / Steven D. Galbraith, Kenneth G. Paterson (eds.)
Pairing-based cryptography - Pairing 2008 : second international conference, Egham, UK, September 1-3, 2008 ; proceedings / / Steven D. Galbraith, Kenneth G. Paterson (eds.)
Edizione [1st ed. 2008.]
Pubbl/distr/stampa Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Descrizione fisica 1 online resource (XI, 377 p.)
Disciplina 005.82
Collana Security and Cryptology
Soggetto topico Computer security
Sets of pairs of functions to be distinguished
Cryptography
ISBN 3-540-85538-6
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talks -- Pairings in Trusted Computing -- Pairing Lattices -- The Uber-Assumption Family -- Cryptography I -- Homomorphic Encryption and Signatures from Vector Decomposition -- Hidden-Vector Encryption with Groups of Prime Order -- Mathematics -- The Hidden Root Problem -- Evaluating Large Degree Isogenies and Applications to Pairing Based Cryptography -- Computing the Cassels Pairing on Kolyvagin Classes in the Shafarevich-Tate Group -- Constructing Pairing Friendly Curves -- Constructing Brezing-Weng Pairing-Friendly Elliptic Curves Using Elements in the Cyclotomic Field -- Constructing Pairing-Friendly Elliptic Curves Using Factorization of Cyclotomic Polynomials -- A Generalized Brezing-Weng Algorithm for Constructing Pairing-Friendly Ordinary Abelian Varieties -- Pairing-Friendly Hyperelliptic Curves with Ordinary Jacobians of Type y 2?=?x 5?+?ax -- Implementation of Pairings -- Integer Variable ?–Based Ate Pairing -- Pairing Computation on Twisted Edwards Form Elliptic Curves -- Exponentiation in Pairing-Friendly Groups Using Homomorphisms -- Generators for the ?-Torsion Subgroup of Jacobians of Genus Two Curves -- Speeding Up Pairing Computations on Genus 2 Hyperelliptic Curves with Efficiently Computable Automorphisms -- Pairings on Hyperelliptic Curves with a Real Model -- Hardware Implementation -- Faster Implementation of ? T Pairing over GF(3 m ) Using Minimum Number of Logical Instructions for GF(3)-Addition -- A Comparison between Hardware Accelerators for the Modified Tate Pairing over and -- Cryptography II -- One-Round ID-Based Blind Signature Scheme without ROS Assumption -- Tracing Malicious Proxies in Proxy Re-encryption -- Security and Anonymity of Identity-Based Encryption with Multiple Trusted Authorities.
Record Nr. UNISA-996465339603316
Berlin, Germany ; ; New York, New York : , : Springer, , [2008]
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – Mycrypt 2005 [[electronic resource] ] : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings / / edited by Ed Dawson, Serge Vaudenay
Progress in Cryptology – Mycrypt 2005 [[electronic resource] ] : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings / / edited by Ed Dawson, Serge Vaudenay
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XI, 329 p.)
Disciplina 005.809595
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer communication systems
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Coding and Information Theory
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of Fast Syndrome Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing -- Identity Based Delegation Network -- On Session Key Construction in Provably-Secure Key Establishment Protocols -- On the Security of Probabilistic Multisignature Schemes and Their Optimality -- Invited Talk II -- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers -- Implementation Issues -- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm -- Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption -- Optimization of the MOVA Undeniable Signature Scheme -- Unconventional Cryptography -- Questionable Encryption and Its Applications -- Twin RSA -- Invited Talk III -- Security of Two-Party Identity-Based Key Agreement -- Block Cipher Cryptanalysis -- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b -- Advanced Slide Attacks Revisited: Realigning Slide on DES -- New Multiset Attacks on Rijndael with Large Blocks -- Homomorphic Encryption -- Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes -- Homomorphic Cryptosystems Based on Subgroup Membership Problems.
Record Nr. UNISA-996465609203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Progress in Cryptology – Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings / / edited by Ed Dawson, Serge Vaudenay
Progress in Cryptology – Mycrypt 2005 : First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings / / edited by Ed Dawson, Serge Vaudenay
Edizione [1st ed. 2005.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Descrizione fisica 1 online resource (XI, 329 p.)
Disciplina 005.809595
Collana Security and Cryptology
Soggetto topico Data encryption (Computer science)
Coding theory
Information theory
Computer communication systems
Algorithms
Computer science—Mathematics
Management information systems
Computer science
Cryptology
Coding and Information Theory
Computer Communication Networks
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
Management of Computing and Information Systems
Classificazione 54.62
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Invited Talk I -- Trends and Challenges for Securer Cryptography in Practice -- Stream Ciphers Analysis -- Distinguishing Attacks on T-Functions -- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity -- Cryptography Based on Combinatorics -- Equivalent Keys in HFE, C*, and Variations -- A New Structural Attack for GPT and Variants -- A Family of Fast Syndrome Based Cryptographic Hash Functions -- Cryptographic Protocols -- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing -- Identity Based Delegation Network -- On Session Key Construction in Provably-Secure Key Establishment Protocols -- On the Security of Probabilistic Multisignature Schemes and Their Optimality -- Invited Talk II -- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers -- Implementation Issues -- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm -- Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption -- Optimization of the MOVA Undeniable Signature Scheme -- Unconventional Cryptography -- Questionable Encryption and Its Applications -- Twin RSA -- Invited Talk III -- Security of Two-Party Identity-Based Key Agreement -- Block Cipher Cryptanalysis -- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b -- Advanced Slide Attacks Revisited: Realigning Slide on DES -- New Multiset Attacks on Rijndael with Large Blocks -- Homomorphic Encryption -- Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes -- Homomorphic Cryptosystems Based on Subgroup Membership Problems.
Record Nr. UNINA-9910483836703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui