passa ai contenuti
Advances in cryptology--ASiACRYPT 2012 : 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012, proceedings Anteprima di questo documento
ChiudiAnteprima di questo documento
Stiamo controllando…

Advances in cryptology--ASiACRYPT 2012 : 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012, proceedings

Autore: Xiaoyun Wang; Kazue Sako, (Innovation Producer)
Editore: Heidelberg ; New York : Springer, ©2012
Serie: Lecture notes in computer science, 7658.
Edizione/Formato:   eBook : Document : Conference publication : EnglishVedi tutte le edizioni e i formati
Banca dati:WorldCat
Sommario:
This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof,  Per saperne di più…
Voto:

(non ancora votato) 0 con commenti - Diventa il primo.

Soggetti
Altri come questo

 

Trova una copia online

Collegamenti a questo documento

Trova una copia in biblioteca

&AllPage.SpinnerRetrieving; Stiamo ricercando le biblioteche che possiedono questo documento…

Dettagli

Genere/forma: Conference proceedings
Congresses
Tipo materiale: Conference publication, Document, Risorsa internet
Tipo documento: Internet Resource, Computer File
Tutti gli autori / Collaboratori: Xiaoyun Wang; Kazue Sako, (Innovation Producer)
ISBN: 3642349617 9783642349614
Numero OCLC: 821020978
Descrizione: 1 online resource (xv, 778 p.)
Contenuti: Pairing-Based Cryptography: Past, Present, and Future / Dan Boneh --
Some Mathematical Mysteries in Lattices / Chuanming Zong --
Constant-Size Structure-Preserving Signatures: Generic Constructions and Simple Assumptions / Masayuki Abe, Melissa Chase, Bernardo David, Markulf Kohlweiss and Ryo Nishimaki, et al. --
Dual Form Signatures: An Approach for Proving Security from Static Assumptions / Michael Gerbush, Allison Lewko, Adam O'Neill and Brent Waters --
Breaking Pairing-Based Cryptosystems Using [eta]T Pairing over GF(397) / Takuya Hayashi, Takeshi Shimoyama, Naoyuki Shinohara and Tsuyoshi Takagi --
On the (Im)possibility of Projecting Property in Prime-Order Setting / Jae Hong Seo --
Optimal Reductions of Some Decisional Problems to the Rank Problem / Jorge Luis Villar --
Signature Schemes Secure against Hard-to-Invert Leakage / Sebastian Faust, Carmit Hazay, Jesper Buus Nielsen, Peter Sebastian Nordholt and Angela Zottarel --
Completeness for Symmetric Two-Party Functionalities - Revisited / Yehuda Lindell, Eran Omri and Hila Zarosim --
Adaptively Secure Garbling with Applications to One-Time Programs and Secure Outsourcing / Mihir Bellare, Viet Tung Hoang and Phillip Rogaway --
The Generalized Randomized Iterate and Its Application to New Efficient Constructions of UOWHFs from Regular One-Way Functions / Scott Ames, Rosario Gennaro and Muthuramakrishnan Venkitasubramaniam --
Perfect Algebraic Immune Functions / Meicheng Liu, Yin Zhang and Dongdai Lin --
Differential Analysis of the LED Block Cipher / Florian Mendel, Vincent Rijmen, Deniz Toz and Kerem Varıcı --
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications Extended Abstract / Julia Borghoff, Anne Canteaut, Tim Güneysu, Elif Bilge Kavun and Miroslav Knezevic, et al. --
Analysis of Differential Attacks in ARX Constructions / Gaëtan Leurent --
Integral and Multidimensional Linear Distinguishers with Correlation Zero / Andrey Bogdanov, Gregor Leander, Kaisa Nyberg and Meiqin Wang --
Differential Attacks against Stream Cipher ZUC / Hongjun Wu, Tao Huang, Phuong Ha Nguyen, Huaxiong Wang and San Ling --
An Asymptotically Tight Security Analysis of the Iterated Even-Mansour Cipher / Rodolphe Lampe, Jacques Patarin and Yannick Seurin --
3kf9: Enhancing 3GPP-MAC beyond the Birthday Bound / Liting Zhang, Wenling Wu, Han Sui and Peng Wang --
Understanding Adaptivity: Random Systems Revisited / Dimitar Jetchev, Onur Özen and Martijn Stam --
RKA Security beyond the Linear Barrier: IBE, Encryption and Signatures / Mihir Bellare, Kenneth G. Paterson and Susan Thomson --
Fully Secure Unbounded Inner-Product and Attribute-Based Encryption / Tatsuaki Okamoto and Katsuyuki Takashima --
Computing on Authenticated Data: New Privacy Definitions and Constructions / Nuttapong Attrapadung, Benoît Libert and Thomas Peters --
A Coding-Theoretic Approach to Recovering Noisy RSA Keys / Kenneth G. Paterson, Antigoni Polychroniadou and Dale L. Sibborn --
Certifying RSA / Saqib A. Kakvi, Eike Kiltz and Alexander May --
Faster Gaussian Lattice Sampling Using Lazy Floating-Point Arithmetic / Léo Ducas and Phong Q. Nguyen --
Learning a Zonotope and More: Cryptanalysis of NTRUSign Countermeasures / Léo Ducas and Phong Q. Nguyen --
On Polynomial Systems Arising from a Weil Descent / Christophe Petit and Jean-Jacques Quisquater --
ECM at Work / Joppe W. Bos and Thorsten Kleinjung --
IND-CCA Secure Cryptography Based on a Variant of the LPN Problem / Nico Döttling, Jörn Müller-Quade and Anderson C. A. Nascimento --
Provable Security of the Knudsen-Preneel Compression Functions / Jooyoung Lee --
Optimal Collision Security in Double Block Length Hashing with Single Length Key / Bart Mennink --
Bicliques for Permutations: Collision and Preimage Attacks in Stronger Settings / Dmitry Khovratovich --
Investigating Fundamental Security Requirements on Whirlpool: Improved Preimage and Collision Attacks / Yu Sasaki, Lei Wang, Shuang Wu and Wenling Wu --
Generic Related-Key Attacks for HMAC / Thomas Peyrin, Yu Sasaki and Lei Wang --
The Five-Card Trick Can Be Done with Four Cards / Takaaki Mizuki, Michihito Kumamoto and Hideaki Sone --
A Mix-Net from Any CCA2 Secure Cryptosystem / Shahram Khazaei, Tal Moran and Douglas Wikström --
How Not to Prove Yourself: Pitfalls of the Fiat-Shamir Heuristic and Applications to Helios / David Bernhard, Olivier Pereira and Bogdan Warinschi --
Sequential Aggregate Signatures with Lazy Verification from Trapdoor Permutations (Extended Abstract) / Kyle Brogle, Sharon Goldberg and Leonid Reyzin --
Commitments and Efficient Zero-Knowledge Proofs from Learning Parity with Noise / Abhishek Jain, Stephan Krenn, Krzysztof Pietrzak and Aris Tentes --
Calling Out Cheaters: Covert Security with Public Verifiability / Gilad Asharov and Claudio Orlandi --
A Unified Framework for UC from Only OT / Rafael Pass, Huijia Lin and Muthuramakrishnan Venkitasubramaniam --
Four-Dimensional Gallant-Lambert-Vanstone Scalar Multiplication / Patrick Longa and Francesco Sica --
Shuffling against Side-Channel Attacks: A Comprehensive Study with Cautionary Note / Nicolas Veyrat-Charvillon, Marcel Medwed, Stéphanie Kerckhof and François-Xavier Standaert --
Theory and Practice of a Leakage Resilient Masking Scheme / Josep Balasch, Sebastian Faust, Benedikt Gierlichs and Ingrid Verbauwhede.
Titolo della serie: Lecture notes in computer science, 7658.
Responsabilità: Xiaoyun Wang, Kazue Sako, eds.
Maggiori informazioni:

Abstract:

This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues.

Commenti

Commenti degli utenti
Recuperando commenti GoodReads…
Stiamo recuperando commenti DOGObooks

Etichette

Diventa il primo.
Conferma questa richiesta

Potresti aver già richiesto questo documento. Seleziona OK se si vuole procedere comunque con questa richiesta.

Dati collegati


<http://www.worldcat.org/oclc/821020978>
library:oclcnum"821020978"
library:placeOfPublication
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/821020978>
rdf:typeschema:Book
rdfs:seeAlso
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:author
rdf:typeschema:Organization
schema:name"ASIACRYPT 2012 : Singapore)"
schema:bookFormatschema:EBook
schema:contributor
schema:contributor
schema:copyrightYear"2012"
schema:datePublished"2012"
schema:description"This book constitutes the refereed proceedings of the 18th International Conference on the Theory and Application of Cryptology and Information Security, Asiacrypt 2012, held in Beijing, China, in December 2012. The 43 full papers presented were carefully reviewed and selected from 241 submissions. They are organized in topical sections named: public-key cryptography, foundation, symmetric cipher, security proof, lattice-based cryptography and number theory, hash function, cryptographic protocol, and implementation issues."
schema:exampleOfWork<http://worldcat.org/entity/work/id/1203208432>
schema:genre"Conference proceedings."
schema:genre"Conference proceedings"
schema:inLanguage"en"
schema:name"Advances in cryptology--ASiACRYPT 2012 18th international conference on the theory and application of cryptology and information security, Beijing, China, December 2-6, 2012, proceedings"
schema:numberOfPages"778"
schema:publisher
schema:url<http://site.ebrary.com/id/10634829>
schema:url<http://dx.doi.org/10.1007/978-3-642-34961-4>
schema:workExample
schema:workExample

Content-negotiable representations

Chiudi finestra

Per favore entra in WorldCat 

Non hai un account? Puoi facilmente crearne uno gratuito.