zum Inhalt wechseln
Advances in cryptology--ASiACRYPT 2012 : 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012, proceedings Titelvorschau
SchließenTitelvorschau
Prüfung…

Advances in cryptology--ASiACRYPT 2012 : 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012, proceedings

Verfasser/in: Xiaoyun Wang; Kazue Sako, (Innovation Producer)
Verlag: Heidelberg ; New York : Springer, ©2012
Serien: Lecture notes in computer science, 7658.
Ausgabe/Format   E-Book : Dokument : Tagungsband : EnglischAlle Ausgaben und Formate anzeigen
Datenbank:WorldCat
Zusammenfassung:
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof,  Weiterlesen…
Bewertung:

(noch nicht bewertet) 0 mit Rezensionen - Verfassen Sie als Erste eine Rezension.

Themen
Ähnliche Titel

 

Online anzeigen

Links zu diesem Titel

Exemplar ausleihen

&AllPage.SpinnerRetrieving; Suche nach Bibliotheken, die diesen Titel besitzen ...

Details

Gattung/Form: Conference proceedings
Congresses
Medientyp: Tagungsband, Dokument, Internetquelle
Dokumenttyp: Internet-Ressource, Computer-Datei
Alle Autoren: Xiaoyun Wang; Kazue Sako, (Innovation Producer)
ISBN: 3642349617 9783642349614
OCLC-Nummer: 821020978
Beschreibung: 1 online resource (xv, 778 p.)
Inhalt: Pairing-Based Cryptography: Past, Present, and Future / Dan Boneh --
Some Mathematical Mysteries in Lattices / Chuanming Zong --
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions / Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss and Ryo Nishimaki, et al. --
Dual Form Signatures: An Approach for Proving Security from Static Assumptions / Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters --
Breaking Pairing-Based Cryptosystems Using [eta]T Pairing over GF(397) / Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara and Tsuyoshi Takagi --
On the (Im)possibility of Projecting Property in Prime-Order Setting / Jae Hong Seo --
Optimal Reductions of Some Decisional Problems to the Rank Problem / Jorge Luis Villar --
Signature Schemes Secure against Hard-to-Invert Leakage / Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt and Angela Zottarel --
Completeness for Symmetric Two-Party Functionalities - Revisited / Yehuda Lindell, Eran Omri and Hila Zarosim --
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing / Mihir Bellare, Viet Tung Hoang and Phillip Rogaway --
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions / Scott Ames, Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam --
Perfect Algebraic Immune Functions / Meicheng Liu, Yin Zhang and Dongdai Lin --
Differential Analysis of the LED Block Cipher / Florian Mendel, Vincent Rijmen, Deniz Toz and Kerem Varıcı --
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications Extended Abstract / Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun and Miroslav Knezevic, et al. --
Analysis of Differential Attacks in ARX Constructions / Gaëtan Leurent --
Integral and Multidimensional Linear Distinguishers with Correlation Zero / Andrey Bogdanov, Gregor Leander, Kaisa Nyberg and Meiqin Wang --
Differential Attacks against Stream Cipher ZUC / Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang and San Ling --
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher / Rodolphe Lampe, Jacques Patarin and Yannick Seurin --
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound / Liting Zhang, Wenling Wu, Han Sui and Peng Wang --
Understanding Adaptivity: Random Systems Revisited / Dimitar Jetchev, Onur Özen and Martijn Stam --
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures / Mihir Bellare, Kenneth G. Paterson and Susan Thomson --
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption / Tatsuaki Okamoto and Katsuyuki Takashima --
Computing on Authenticated Data: New Privacy Definitions and Constructions / Nuttapong Attrapadung, Benoît Libert and Thomas Peters --
A Coding-Theoretic Approach to Recovering Noisy RSA Keys / Kenneth G. Paterson, Antigoni Polychroniadou and Dale L. Sibborn --
Certifying RSA / Saqib A. Kakvi, Eike Kiltz and Alexander May --
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic / Léo Ducas and Phong Q. Nguyen --
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures / Léo Ducas and Phong Q. Nguyen --
On Polynomial Systems Arising from a Weil Descent / Christophe Petit and Jean-Jacques Quisquater --
ECM at Work / Joppe W. Bos and Thorsten Kleinjung --
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem / Nico Döttling, Jörn Müller-Quade and Anderson C. A. Nascimento --
Provable Security of the Knudsen-Preneel Compression Functions / Jooyoung Lee --
Optimal Collision Security in Double Block Length Hashing with Single Length Key / Bart Mennink --
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings / Dmitry Khovratovich --
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks / Yu Sasaki, Lei Wang, Shuang Wu and Wenling Wu --
Generic Related-Key Attacks for HMAC / Thomas Peyrin, Yu Sasaki and Lei Wang --
The Five-Card Trick Can Be Done with Four Cards / Takaaki Mizuki, Michihito Kumamoto and Hideaki Sone --
A Mix-Net from Any CCA2 Secure Cryptosystem / Shahram Khazaei, Tal Moran and Douglas Wikström --
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios / David Bernhard, Olivier Pereira and Bogdan Warinschi --
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations (Extended Abstract) / Kyle Brogle, Sharon Goldberg and Leonid Reyzin --
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise / Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak and Aris Tentes --
Calling Out Cheaters: Covert Security with Public Verifiability / Gilad Asharov and Claudio Orlandi --
A Unified Framework for UC from Only OT / Rafael Pass, Huijia Lin and Muthuramakrishnan Venkitasubramaniam --
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication / Patrick Longa and Francesco Sica --
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof and François-Xavier Standaert --
Theory and Practice of a Leakage Resilient Masking Scheme / Josep Balasch, Sebastian Faust, Benedikt Gierlichs and Ingrid Verbauwhede.
Serientitel: Lecture notes in computer science, 7658.
Verfasserangabe: Xiaoyun Wang, Kazue Sako, eds.
Weitere Informationen:

Abstract:

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Rezensionen

Nutzer-Rezensionen
Suche nach GoodReads-Rezensionen
Suche nach DOGObooks-Rezensionen…

Tags

Tragen Sie als Erste Tags ein.
Anfrage bestätigen

Sie haben diesen Titel bereits angefordert. Wenn Sie trotzdem fortfahren möchten, klicken Sie auf OK.

Verlinkung


<http://www.worldcat.org/oclc/821020978>
library:oclcnum"821020978"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/821020978>
rdf:typeschema:Book
rdfs:seeAlso
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:author
rdf:typeschema:Organization
schema:name"ASIACRYPT 2012 : Singapore)"
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:copyrightYear"2012"
schema:datePublished"2012"
schema:description"This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1203208432>
schema:genre"Conference proceedings."
schema:genre"Conference proceedings"
schema:inLanguage"en"
schema:name"Advances in cryptology--ASiACRYPT 2012 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012, proceedings"
schema:numberOfPages"778"
schema:publisher
schema:url<http://site.ebrary.com/id/10634829>
schema:url<http://dx.doi.org/10.1007/978-3-642-34961-4>
schema:workExample
schema:workExample

Content-negotiable representations

Fenster schließen

Bitte in WorldCat einloggen 

Sie haben kein Konto? Sie können sehr einfach ein kostenloses Konto anlegen,.