Topics in Cryptology -- CT-RSA 2005 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings / / edited by Alfred John Menezes |
Edizione | [1st ed. 2005.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 |
Descrizione fisica | 1 online resource (X, 390 p.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Operating systems (Computers) Management information systems Computer science Algorithms Computer communication systems Cryptology Discrete Mathematics in Computer Science Operating Systems Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-540-30574-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Invited Talks -- Sub-linear Queries Statistical Databases: Privacy with Power -- Malicious Cryptography: Kleptographic Aspects -- Cryptanalysis -- Resistance of SNOW 2.0 Against Algebraic Attacks -- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes -- Hold Your Sessions: An Attack on Java Session-Id Generation -- Update on SHA-1 -- A Fast Correlation Attack on the Shrinking Generator -- Public-Key Encryption -- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption -- A Generic Conversion with Optimal Redundancy -- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3 -- Signature Schemes -- Foundations of Group Signatures: The Case of Dynamic Groups -- Time-Selective Convertible Undeniable Signatures -- Design Principles -- On Tolerant Cryptographic Constructions -- Password-Based Protocols -- Simple Password-Based Encrypted Key Exchange Protocols -- Hard Bits of the Discrete Log with Applications to Password Authentication -- Proofs for Two-Server Password Authentication -- Design and Analysis of Password-Based Key Derivation Functions -- Pairings -- A New Two-Party Identity-Based Authenticated Key Agreement -- Accumulators from Bilinear Pairings and Applications -- Computing the Tate Pairing -- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings -- Efficient and Secure Implementation -- A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box -- CryptoGraphics: Secret Key Cryptography Using Graphics Cards -- Side-Channel Leakage of Masked CMOS Gates -- New Minimal Weight Representations for Left-to-Right Window Methods. |
Record Nr. | UNISA-996466022203316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2005 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Topics in Cryptology -- CT-RSA 2006 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings / / edited by David Pointcheval |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XI, 365 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Operating systems (Computers) Management information systems Computer science Algorithms Computer communication systems Cryptology Discrete Mathematics in Computer Science Operating Systems Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-540-32648-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attacks on AES -- Cache Attacks and Countermeasures: The Case of AES -- Related-Key Impossible Differential Attacks on 8-Round AES-192 -- Identification -- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators -- Fair Identification -- Algebra -- Efficient Doubling on Genus 3 Curves over Binary Fields -- Another Look at Small RSA Exponents -- Integrity -- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing -- RFID-Tags for Anti-counterfeiting -- Public Key Encryption -- A “Medium-Field” Multivariate Public-Key Encryption Scheme -- A New Security Proof for Damgård’s ElGamal -- Signatures -- Stand-Alone and Setup-Free Verifiably Committed Signatures -- Toward the Fair Anonymous Signatures: Deniable Ring Signatures -- Side-Channel Attacks -- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers -- Higher Order Masking of the AES -- CCA Encryption -- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles -- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack -- Message Authentication -- On the (Im)possibility of Blind Message Authentication Codes -- An Optimal Non-interactive Message Authentication Protocol -- Block Ciphers -- A New Criterion for Nonlinearity of Block Ciphers -- Block Ciphers Sensitive to Gröbner Basis Attacks -- Multi-party Computation -- Universally Composable Oblivious Transfer in the Multi-party Setting -- A Round and Communication Efficient Secure Ranking Protocol. |
Record Nr. | UNINA-9910481961503321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Topics in Cryptology -- CT-RSA 2006 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2006, San Jose, CA, USA, February 13-17, 2005, Proceedings / / edited by David Pointcheval |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XI, 365 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Operating systems (Computers) Management information systems Computer science Algorithms Computer communication systems Cryptology Discrete Mathematics in Computer Science Operating Systems Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-540-32648-0 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Attacks on AES -- Cache Attacks and Countermeasures: The Case of AES -- Related-Key Impossible Differential Attacks on 8-Round AES-192 -- Identification -- Session Corruption Attack and Improvements on Encryption Based MT-Authenticators -- Fair Identification -- Algebra -- Efficient Doubling on Genus 3 Curves over Binary Fields -- Another Look at Small RSA Exponents -- Integrity -- Collision-Resistant Usage of MD5 and SHA-1 Via Message Preprocessing -- RFID-Tags for Anti-counterfeiting -- Public Key Encryption -- A “Medium-Field” Multivariate Public-Key Encryption Scheme -- A New Security Proof for Damgård’s ElGamal -- Signatures -- Stand-Alone and Setup-Free Verifiably Committed Signatures -- Toward the Fair Anonymous Signatures: Deniable Ring Signatures -- Side-Channel Attacks -- Practical Second-Order DPA Attacks for Masked Smart Card Implementations of Block Ciphers -- Higher Order Masking of the AES -- CCA Encryption -- Chosen Ciphertext Secure Public Key Threshold Encryption Without Random Oracles -- How to Construct Multicast Cryptosystems Provably Secure Against Adaptive Chosen Ciphertext Attack -- Message Authentication -- On the (Im)possibility of Blind Message Authentication Codes -- An Optimal Non-interactive Message Authentication Protocol -- Block Ciphers -- A New Criterion for Nonlinearity of Block Ciphers -- Block Ciphers Sensitive to Gröbner Basis Attacks -- Multi-party Computation -- Universally Composable Oblivious Transfer in the Multi-party Setting -- A Round and Communication Efficient Secure Ranking Protocol. |
Record Nr. | UNISA-996466093403316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XI, 403 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Computer security Management information systems Computer science Algorithms Computer communication systems Cryptology Discrete Mathematics in Computer Science Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-540-69328-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Symmetric-Key Encryption -- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers -- A Simple Related-Key Attack on the Full SHACAL-1 -- Signatures and Authentication -- Impossibility Proofs for RSA Signatures in the Standard Model -- Selecting Secure Passwords -- Human Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function -- Second Preimages for SMASH -- Digital Signatures (I) -- A Practical Optimal Padding for Signature Schemes -- Directed Transitive Signature Scheme -- Identity-Based Multi-signatures from RSA -- Cryptographic Protocols (I) -- Improved Efficiency for Private Stable Matching -- Compact E-Cash from Bounded Accumulator -- Batch Processing of Interactive Proofs -- Side-Channel Attacks (I) -- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls -- Predicting Secret Keys Via Branch Prediction -- Side-Channel Attacks (II) -- Template Attacks on Masking—Resistance Is Futile -- Differential Power Analysis of Stream Ciphers -- Cache Based Remote Timing Attack on the AES -- Cryptographic Protocols (II) -- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement -- Efficient Password-Authenticated Key Exchange Based on RSA -- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels -- Digital Signatures (II) -- A Practical and Tightly Secure Signature Scheme Without Hash Function -- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature -- Efficient Implementation -- Public Key Cryptography and RFID Tags -- A Bit-Slice Implementation of the Whirlpool Hash Function. |
Record Nr. | UNINA-9910484786403321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Topics in Cryptology – CT-RSA 2007 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2007, San Fancisco, CA, USA, February 5-9, 2007, Proceedings / / edited by Masayuki Abe |
Edizione | [1st ed. 2006.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 |
Descrizione fisica | 1 online resource (XI, 403 p.) |
Disciplina | 005.8 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer science—Mathematics Computer security Management information systems Computer science Algorithms Computer communication systems Cryptology Discrete Mathematics in Computer Science Systems and Data Security Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Computer Communication Networks |
ISBN | 3-540-69328-9 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Symmetric-Key Encryption -- MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers -- A Simple Related-Key Attack on the Full SHACAL-1 -- Signatures and Authentication -- Impossibility Proofs for RSA Signatures in the Standard Model -- Selecting Secure Passwords -- Human Identification Through Image Evaluation Using Secret Predicates -- Hash Functions -- Cryptanalysis of Reduced Variants of the FORK-256 Hash Function -- Second Preimages for SMASH -- Digital Signatures (I) -- A Practical Optimal Padding for Signature Schemes -- Directed Transitive Signature Scheme -- Identity-Based Multi-signatures from RSA -- Cryptographic Protocols (I) -- Improved Efficiency for Private Stable Matching -- Compact E-Cash from Bounded Accumulator -- Batch Processing of Interactive Proofs -- Side-Channel Attacks (I) -- Timing Attacks on NTRUEncrypt Via Variation in the Number of Hash Calls -- Predicting Secret Keys Via Branch Prediction -- Side-Channel Attacks (II) -- Template Attacks on Masking—Resistance Is Futile -- Differential Power Analysis of Stream Ciphers -- Cache Based Remote Timing Attack on the AES -- Cryptographic Protocols (II) -- Group Secret Handshakes Or Affiliation-Hiding Authenticated Group Key Agreement -- Efficient Password-Authenticated Key Exchange Based on RSA -- Non-degrading Erasure-Tolerant Information Authentication with an Application to Multicast Stream Authentication over Lossy Channels -- Digital Signatures (II) -- A Practical and Tightly Secure Signature Scheme Without Hash Function -- How to Strengthen Any Weakly Unforgeable Signature into a Strongly Unforgeable Signature -- Efficient Implementation -- Public Key Cryptography and RFID Tags -- A Bit-Slice Implementation of the Whirlpool Hash Function. |
Record Nr. | UNISA-996466161003316 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2006 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Topics in Cryptology – CT-RSA 2017 [[electronic resource] ] : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings / / edited by Helena Handschuh |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 452 p. 78 illus.) |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Management information systems Computer science Algorithms Computer science—Mathematics Cryptology Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-52153-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public Key Implementations -- Lattice-based Cryptanalysis -- Fault and Glitch Resistant Implementations -- Side-channel Resistant Implementations -- Digital Signatures and Random Numbers -- Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Symmetric Key Constructions -- 2017 Selected Topics -- Improved Key Recovery Algorithms -- Side-channel Analysis -- Cryptographic Protocols -- Public Key Algorithms. |
Record Nr. | UNINA-9910483294603321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Topics in Cryptology – CT-RSA 2017 [[electronic resource] ] : The Cryptographers’ Track at the RSA Conference 2017, San Francisco, CA, USA, February 14–17, 2017, Proceedings / / edited by Helena Handschuh |
Edizione | [1st ed. 2017.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 |
Descrizione fisica | 1 online resource (XIII, 452 p. 78 illus.) |
Disciplina | 005.824 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Computer security Computer communication systems Management information systems Computer science Algorithms Computer science—Mathematics Cryptology Systems and Data Security Computer Communication Networks Management of Computing and Information Systems Algorithm Analysis and Problem Complexity Discrete Mathematics in Computer Science |
ISBN | 3-319-52153-5 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Public Key Implementations -- Lattice-based Cryptanalysis -- Fault and Glitch Resistant Implementations -- Side-channel Resistant Implementations -- Digital Signatures and Random Numbers -- Post-Quantum Cryptography -- Symmetric Key Cryptanalysis -- Symmetric Key Constructions -- 2017 Selected Topics -- Improved Key Recovery Algorithms -- Side-channel Analysis -- Cryptographic Protocols -- Public Key Algorithms. |
Record Nr. | UNISA-996465738603316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2017 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Topics in Cryptology – CT-RSA 2018 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings / / edited by Nigel P. Smart |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 514 p. 90 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Logic design Computer communication systems Management information systems Computer science Cryptology Software Engineering/Programming and Operating Systems Logic Design Computer Communication Networks Management of Computing and Information Systems |
ISBN | 3-319-76953-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptography -- Public-key cryptography -- Symmetric-key cryptography -- Crypto- graphic Protocols -- Primitives and their implementation security. |
Record Nr. | UNINA-9910349425003321 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|
Topics in Cryptology – CT-RSA 2018 [[electronic resource] ] : The Cryptographers' Track at the RSA Conference 2018, San Francisco, CA, USA, April 16-20, 2018, Proceedings / / edited by Nigel P. Smart |
Edizione | [1st ed. 2018.] |
Pubbl/distr/stampa | Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 |
Descrizione fisica | 1 online resource (XI, 514 p. 90 illus.) |
Disciplina | 005.82 |
Collana | Security and Cryptology |
Soggetto topico |
Data encryption (Computer science)
Software engineering Logic design Computer communication systems Management information systems Computer science Cryptology Software Engineering/Programming and Operating Systems Logic Design Computer Communication Networks Management of Computing and Information Systems |
ISBN | 3-319-76953-7 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Cryptography -- Public-key cryptography -- Symmetric-key cryptography -- Crypto- graphic Protocols -- Primitives and their implementation security. |
Record Nr. | UNISA-996466219703316 |
Cham : , : Springer International Publishing : , : Imprint : Springer, , 2018 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. di Salerno | ||
|
Topics in Electronic Commerce [[electronic resource] ] : Second International Symposium, ISEC 2001 Hong Kong, China, April 26-28, 2001 Proceedings / / edited by Weidong Kou, Yelena Yesha, Chung J. Tan |
Edizione | [1st ed. 2001.] |
Pubbl/distr/stampa | Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 |
Descrizione fisica | 1 online resource (X, 194 p.) |
Disciplina | 658.84 |
Collana | Lecture Notes in Computer Science |
Soggetto topico |
Trade
Business Commerce Computer science E-commerce Computer communication systems Computers and civilization Management information systems Popular Computer Science e-Commerce/e-business Computer Communication Networks Computers and Society Management of Computing and Information Systems |
ISBN | 3-540-45415-2 |
Formato | Materiale a stampa |
Livello bibliografico | Monografia |
Lingua di pubblicazione | eng |
Nota di contenuto | Secure Payment -- An Efficient Multiple Merchants Payment Protocol for Secure Electronic Transactions Based on Purchase Consolidation -- A Fair Electronic Cash Scheme -- A Secure Payment Protocol Using Mobile Agents in an Untrusted Host Environment -- Trust and Security -- Building Trust for E-Commerce: Collaborating Label Bureaus -- Group-Oriented (t, n) Threshold Digital Signature Schemes with Traceable Signers -- The Implementation of Security Algorithm of Mobile Agent on Roblet -- Tools for E-Commerce Applications -- Active Page Generation via Customizing XML for Data Beans in E-Commerce Applications -- i-Cube: A Tool-Set for the Dynamic Extraction and Integration of Web Data Content -- E-Commerce Frameworks and Systems -- An Extensible, Human-Centric Framework That Promotes Universal Access to Electronic Commerce -- CBR-Responder, an Automated Customer Service for E-Commerce -- Performance and QoS -- Introducing QoS to Electronic Commerce Applications -- A Methodology and Implementation for Analytic Modeling in Electronic Commerce Applications -- E-Commerce Surveys -- Internet Based Electronic Business Framework Applications and Business to Business Standards -- Online Auction Protocols: A Comparative Study. |
Record Nr. | UNINA-9910143597203321 |
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2001 | ||
Materiale a stampa | ||
Lo trovi qui: Univ. Federico II | ||
|