Cryptography and Coding 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings /
Saved in:
| Corporate Author: | |
|---|---|
| Other Authors: | |
| Format: | Electronic eBook |
| Language: | English |
| Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2005.
|
| Edition: | 1st ed. 2005. |
| Series: | Security and Cryptology ;
3796 |
| Subjects: | |
| Online Access: | https://doi.org/10.1007/11586821 |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| LEADER | 04478nam a22005775i 4500 | ||
|---|---|---|---|
| 001 | 978-3-540-32418-8 | ||
| 003 | DE-He213 | ||
| 005 | 20200702041002.0 | ||
| 007 | cr nn 008mamaa | ||
| 008 | 100412s2005 gw | s |||| 0|eng d | ||
| 020 | |a 9783540324188 |9 978-3-540-32418-8 | ||
| 024 | 7 | |a 10.1007/11586821 |2 doi | |
| 050 | 4 | |a QA76.9.D335 | |
| 072 | 7 | |a GPJ |2 bicssc | |
| 072 | 7 | |a COM053000 |2 bisacsh | |
| 072 | 7 | |a GPJ |2 thema | |
| 072 | 7 | |a URY |2 thema | |
| 082 | 0 | 4 | |a 005.82 |2 23 |
| 245 | 1 | 0 | |a Cryptography and Coding |h [electronic resource] : |b 10th IMA International Conference, Cirencester, UK, December 19-21, 2005, Proceedings / |c edited by Nigel Smart. |
| 250 | |a 1st ed. 2005. | ||
| 264 | 1 | |a Berlin, Heidelberg : |b Springer Berlin Heidelberg : |b Imprint: Springer, |c 2005. | |
| 300 | |a XII, 468 p. |b online resource. | ||
| 336 | |a text |b txt |2 rdacontent | ||
| 337 | |a computer |b c |2 rdamedia | ||
| 338 | |a online resource |b cr |2 rdacarrier | ||
| 347 | |a text file |b PDF |2 rda | ||
| 490 | 1 | |a Security and Cryptology ; |v 3796 | |
| 505 | 0 | |a Invited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploiting Coding Theory for Collision Attacks on SHA-1 -- Signatures and Signcryption -- Hash Based Digital Signature Schemes -- A General Construction for Simultaneous Signing and Encrypting -- Non-interactive Designated Verifier Proofs and Undeniable Signatures -- Symmetric Cryptography -- Partial Key Recovery Attacks on XCBC, TMAC and OMAC -- Domain Expansion of MACs: Alternative Uses of the FIL-MAC -- Normality of Vectorial Functions -- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 -- Side Channels -- The Physically Observable Security of Signature Schemes -- On the Automatic Construction of Indistinguishable Operations -- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods -- Algebraic Cryptanalysis -- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem -- An Algebraic Framework for Cipher Embeddings -- Probabilistic Algebraic Attacks -- Information Theoretic Applications -- Unconditionally Secure Information Authentication in Presence of Erasures -- Generalized Strong Extractors and Deterministic Privacy Amplification -- On Threshold Self-healing Key Distribution Schemes -- Number Theoretic Foundations -- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator -- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited -- Pairings on Elliptic Curves over Finite Commutative Rings -- Public Key and ID-Based Encryption Schemes -- A Key Encapsulation Mechanism for NTRU -- Efficient Identity-Based Key Encapsulation to Multiple Parties -- Security Proof of Sakai-Kasahara’s Identity-Based Encryption Scheme. | |
| 650 | 0 | |a Data encryption (Computer science). | |
| 650 | 0 | |a Computers. | |
| 650 | 0 | |a Coding theory. | |
| 650 | 0 | |a Information theory. | |
| 650 | 0 | |a Computer science—Mathematics. | |
| 650 | 0 | |a Computer communication systems. | |
| 650 | 1 | 4 | |a Cryptology. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
| 650 | 2 | 4 | |a Theory of Computation. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I16005 |
| 650 | 2 | 4 | |a Coding and Information Theory. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I15041 |
| 650 | 2 | 4 | |a Discrete Mathematics in Computer Science. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I17028 |
| 650 | 2 | 4 | |a Computer Communication Networks. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022 |
| 700 | 1 | |a Smart, Nigel. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
| 710 | 2 | |a SpringerLink (Online service) | |
| 773 | 0 | |t Springer Nature eBook | |
| 776 | 0 | 8 | |i Printed edition: |z 9783540817888 |
| 776 | 0 | 8 | |i Printed edition: |z 9783540302766 |
| 830 | 0 | |a Security and Cryptology ; |v 3796 | |
| 856 | 4 | 0 | |u https://doi.org/10.1007/11586821 |
| 912 | |a ZDB-2-SCS | ||
| 912 | |a ZDB-2-SXCS | ||
| 912 | |a ZDB-2-LNC | ||
| 950 | |a Computer Science (SpringerNature-11645) | ||
| 950 | |a Computer Science (R0) (SpringerNature-43710) | ||



