Progress in Cryptology - INDOCRYPT 2006 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings /
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2006.
|
Edition: | 1st ed. 2006. |
Series: | Security and Cryptology ;
4329 |
Subjects: | |
Online Access: | https://doi.org/10.1007/11941378 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 05298nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-540-49769-1 | ||
003 | DE-He213 | ||
005 | 20200707021204.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2006 gw | s |||| 0|eng d | ||
020 | |a 9783540497691 |9 978-3-540-49769-1 | ||
024 | 7 | |a 10.1007/11941378 |2 doi | |
050 | 4 | |a QA76.9.D335 | |
072 | 7 | |a GPJ |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
072 | 7 | |a GPJ |2 thema | |
072 | 7 | |a URY |2 thema | |
082 | 0 | 4 | |a 005.82 |2 23 |
245 | 1 | 0 | |a Progress in Cryptology - INDOCRYPT 2006 |h [electronic resource] : |b 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings / |c edited by Rana Barua, Tanja Lange. |
250 | |a 1st ed. 2006. | ||
264 | 1 | |a Berlin, Heidelberg : |b Springer Berlin Heidelberg : |b Imprint: Springer, |c 2006. | |
300 | |a XIV, 458 p. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Security and Cryptology ; |v 4329 | |
505 | 0 | |a Invited Talk -- Whither Cryptography? -- Symmetric Cryptography: Attacks -- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4 -- Differential and Rectangle Attacks on Reduced-Round SHACAL-1 -- Algebraic Attacks on Clock-Controlled Cascade Ciphers -- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication -- Hash Functions -- Update on Tiger -- RC4-Hash: A New Hash Function Based on RC4 -- Security of VSH in the Real World -- Provable Security: Key Agreement -- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols -- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols -- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols -- Invited Talk -- Another Look at “Provable Security”. II -- Provable Security: Public Key Cryptography -- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions -- General Conversion for Obtaining Strongly Existentially Unforgeable Signatures -- Conditionally Verifiable Signature -- Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission -- Symmetric Cryptography: Design -- Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks -- Enciphering with Arbitrary Small Finite Domains -- Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240 -- Modes of Operation and Message Authentication Codes -- Symmetric Nonce Respecting Security Model and the MEM Mode of Operation -- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach -- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function -- A Simple and Unified Method of Proving Indistinguishability -- Fast Implementation of Public Key Cryptography -- Extended Double-Base Number System with Applications to Elliptic Curve Cryptography -- CMSS – An Improved Merkle Signature Scheme -- ID-Based Cryptography -- Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature -- Secure Cryptographic Workflow in the Standard Model -- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext -- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction -- Embedded System and Side Channel Attacks -- AES Software Implementations on ARM7TDMI -- Galois LFSR, Embedded Devices and Side Channel Weaknesses. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Algorithms. | |
650 | 0 | |a Computer science—Mathematics. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer communication systems. | |
650 | 0 | |a Management information systems. | |
650 | 0 | |a Computer science. | |
650 | 1 | 4 | |a Cryptology. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
650 | 2 | 4 | |a Algorithm Analysis and Problem Complexity. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I16021 |
650 | 2 | 4 | |a Discrete Mathematics in Computer Science. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I17028 |
650 | 2 | 4 | |a Systems and Data Security. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 | |a Computer Communication Networks. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022 |
650 | 2 | 4 | |a Management of Computing and Information Systems. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I24067 |
700 | 1 | |a Barua, Rana. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Lange, Tanja. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer Nature eBook | |
776 | 0 | 8 | |i Printed edition: |z 9783540833383 |
776 | 0 | 8 | |i Printed edition: |z 9783540497677 |
830 | 0 | |a Security and Cryptology ; |v 4329 | |
856 | 4 | 0 | |u https://doi.org/10.1007/11941378 |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-SXCS | ||
912 | |a ZDB-2-LNC | ||
950 | |a Computer Science (SpringerNature-11645) | ||
950 | |a Computer Science (R0) (SpringerNature-43710) |