Progress in Cryptology - INDOCRYPT 2010 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings /
Saved in:
Corporate Author: | |
---|---|
Other Authors: | , |
Format: | Electronic eBook |
Language: | English |
Published: |
Berlin, Heidelberg :
Springer Berlin Heidelberg : Imprint: Springer,
2010.
|
Edition: | 1st ed. 2010. |
Series: | Security and Cryptology ;
6498 |
Subjects: | |
Online Access: | https://doi.org/10.1007/978-3-642-17401-8 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
LEADER | 04830nam a22006135i 4500 | ||
---|---|---|---|
001 | 978-3-642-17401-8 | ||
003 | DE-He213 | ||
005 | 20200630065047.0 | ||
007 | cr nn 008mamaa | ||
008 | 101201s2010 gw | s |||| 0|eng d | ||
020 | |a 9783642174018 |9 978-3-642-17401-8 | ||
024 | 7 | |a 10.1007/978-3-642-17401-8 |2 doi | |
050 | 4 | |a QA76.9.D335 | |
072 | 7 | |a GPJ |2 bicssc | |
072 | 7 | |a COM053000 |2 bisacsh | |
072 | 7 | |a GPJ |2 thema | |
072 | 7 | |a URY |2 thema | |
082 | 0 | 4 | |a 005.82 |2 23 |
245 | 1 | 0 | |a Progress in Cryptology - INDOCRYPT 2010 |h [electronic resource] : |b 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings / |c edited by Guang Gong, Kishan Chand Gupta. |
250 | |a 1st ed. 2010. | ||
264 | 1 | |a Berlin, Heidelberg : |b Springer Berlin Heidelberg : |b Imprint: Springer, |c 2010. | |
300 | |a XVI, 366 p. 63 illus. |b online resource. | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a text file |b PDF |2 rda | ||
490 | 1 | |a Security and Cryptology ; |v 6498 | |
505 | 0 | |a Invited Talk -- Getting a Few Things Right and Many Things Wrong -- Security of RSA and Multivariate Schemes -- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions -- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks -- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key -- Security Analysis, Pseudorandom Permutations and Applications -- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols -- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations -- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants -- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface -- Invited Talk -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function -- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing -- Speeding Up the Wide-Pipe: Secure and Fast Hashing -- Attacks on Block Ciphers and Stream Ciphers -- New Boomerang Attacks on ARIA -- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers -- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA -- Greedy Distinguishers and Nonrandomness Detectors -- Fast Cryptographic Computation -- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity -- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication -- Cryptanalysis of AES -- Attack on a Higher-Order Masking of the AES Based on Homographic Functions -- Improved Impossible Differential Cryptanalysis of 7-Round AES-128 -- Cryptanalysis of a Perturbated White-Box AES Implementation -- Efficient Implementation -- A Program Generator for Intel AES-NI Instructions -- ECC2K-130 on NVIDIA GPUs -- One Byte per Clock: A Novel RC4 Hardware. | |
650 | 0 | |a Data encryption (Computer science). | |
650 | 0 | |a Computer communication systems. | |
650 | 0 | |a Algorithms. | |
650 | 0 | |a Management information systems. | |
650 | 0 | |a Computer science. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Computer science—Mathematics. | |
650 | 1 | 4 | |a Cryptology. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
650 | 2 | 4 | |a Computer Communication Networks. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I13022 |
650 | 2 | 4 | |a Algorithm Analysis and Problem Complexity. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I16021 |
650 | 2 | 4 | |a Management of Computing and Information Systems. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I24067 |
650 | 2 | 4 | |a Systems and Data Security. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 | |a Discrete Mathematics in Computer Science. |0 https://scigraph.springernature.com/ontologies/product-market-codes/I17028 |
700 | 1 | |a Gong, Guang. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
700 | 1 | |a Gupta, Kishan Chand. |e editor. |4 edt |4 http://id.loc.gov/vocabulary/relators/edt | |
710 | 2 | |a SpringerLink (Online service) | |
773 | 0 | |t Springer Nature eBook | |
776 | 0 | 8 | |i Printed edition: |z 9783642174001 |
776 | 0 | 8 | |i Printed edition: |z 9783642174025 |
830 | 0 | |a Security and Cryptology ; |v 6498 | |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-642-17401-8 |
912 | |a ZDB-2-SCS | ||
912 | |a ZDB-2-SXCS | ||
912 | |a ZDB-2-LNC | ||
950 | |a Computer Science (SpringerNature-11645) | ||
950 | |a Computer Science (R0) (SpringerNature-43710) |