skip to content
Advances in cryptology - EUROCRYPT 2009 : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology - EUROCRYPT 2009 : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings

Author: Antoine Joux
Publisher: Berlin : Springer, 2009.
Series: Lecture notes in computer science, 5479.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference proceedings
Congresses
Additional Physical Format: Print version:
EUROCRYPT.
Advances in cryptology - EUROCRYPT 2009.
Berlin : Springer, 2009
(OCoLC)320198698
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Antoine Joux
ISBN: 9783642010019 3642010016
OCLC Number: 405546164
Notes: International conference proceedings.
Description: 1 online resource (xv, 609 p.) : ill.
Contents: Possibility and impossibility results for encryption and commitment secure under selective opening --
Breaking RSA generically is equivalent to factoring --
Resettably secure computation --
On the security loss in cryptographic reductions --
On randomizing hash functions to strengthen the security of digital signatures --
Cryptanalysis of MDC-2 --
Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC --
Finding preimages in full MD5 faster than exhaustive search --
Asymmetric group key agreement --
Adaptive security in broadcast encryption systems (with short ciphertexts) --
Traitors collaborating in public : Pirates 2.0 --
Key agreement from close secrets over unsecured channels --
Order-preserving symmetric encryption --
A double-piped mode of operation for MACs, PRFs and PROs : Security beyond the birthday barrier --
On the security of cryptosystems with quadratic decryption : The nicest cryptanalysis --
Cube attacks on tweakable black box polynomials --
Smashing SQUASH-0 --
Practical chosen ciphertext secure encryption from factoring --
Realizing hash-and-sign signatures under standard assumptions --
A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks --
Cryptography without (hardly any) secrets ? --
Salvaging Merkle-Damgård for practical applications --
On the security of padding-based encryption schemes - or - why we cannot prove OAEP secure in the standard model --
Simulation without the artificial abort : Simplified proof and improved concrete security for Waters' IBE scheme --
On the portability of generalized Schnorr proofs --
A unified framework for the analysis of side-channel key recovery attacks --
A leakage-resilient mode of operation --
ECM on graphics cards --
Double-base number system for multi-scalar multiplications --
Endomorphisms for faster elliptic curve cryptography on a large class of curves --
Generating genus two hyperelliptic curves over large characteristic finite fields --
Verifiable random functions from identity-based key encapsulation --
Optimal randomness extraction from a Diffie-Hellman element --
A new randomness extraction paradigm for hybrid encryption.
Series Title: Lecture notes in computer science, 5479.
Responsibility: Antoine Joux (ed.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/405546164> # Advances in cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings
    a schema:MediaObject, schema:CreativeWork, schema:Book ;
    library:oclcnum "405546164" ;
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/892062530#Place/berlin> ; # Berlin
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/892062530#Topic/computer_security> ; # Computer Security
    schema:about <http://experiment.worldcat.org/entity/work/data/892062530#Topic/kryptologie> ; # Kryptologie
    schema:about <http://experiment.worldcat.org/entity/work/data/892062530#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/892062530#Topic/computing_methodologies> ; # Computing Methodologies
    schema:about <http://experiment.worldcat.org/entity/work/data/892062530#Topic/kryptosystem> ; # Kryptosystem
    schema:about <http://dewey.info/class/005.8/e22/> ;
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/892062530#Topic/informatique> ; # Informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/892062530#Place/koln_2009> ; # Köln <2009>
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/162770271> ; # Antoine Joux
    schema:creator <http://experiment.worldcat.org/entity/work/data/892062530#Meeting/eurocrypt_conference> ; # EUROCRYPT (Conference)
    schema:datePublished "2009" ;
    schema:description "Possibility and impossibility results for encryption and commitment secure under selective opening -- Breaking RSA generically is equivalent to factoring -- Resettably secure computation -- On the security loss in cryptographic reductions -- On randomizing hash functions to strengthen the security of digital signatures -- Cryptanalysis of MDC-2 -- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC -- Finding preimages in full MD5 faster than exhaustive search -- Asymmetric group key agreement -- Adaptive security in broadcast encryption systems (with short ciphertexts) -- Traitors collaborating in public : Pirates 2.0 -- Key agreement from close secrets over unsecured channels -- Order-preserving symmetric encryption -- A double-piped mode of operation for MACs, PRFs and PROs : Security beyond the birthday barrier -- On the security of cryptosystems with quadratic decryption : The nicest cryptanalysis -- Cube attacks on tweakable black box polynomials -- Smashing SQUASH-0 -- Practical chosen ciphertext secure encryption from factoring -- Realizing hash-and-sign signatures under standard assumptions -- A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks -- Cryptography without (hardly any) secrets ? -- Salvaging Merkle-Damgård for practical applications -- On the security of padding-based encryption schemes - or - why we cannot prove OAEP secure in the standard model -- Simulation without the artificial abort : Simplified proof and improved concrete security for Waters' IBE scheme -- On the portability of generalized Schnorr proofs -- A unified framework for the analysis of side-channel key recovery attacks -- A leakage-resilient mode of operation -- ECM on graphics cards -- Double-base number system for multi-scalar multiplications -- Endomorphisms for faster elliptic curve cryptography on a large class of curves -- Generating genus two hyperelliptic curves over large characteristic finite fields -- Verifiable random functions from identity-based key encapsulation -- Optimal randomness extraction from a Diffie-Hellman element -- A new randomness extraction paradigm for hybrid encryption."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/892062530> ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference proceedings"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/892062530#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
    schema:isSimilarTo <http://www.worldcat.org/oclc/320198698> ;
    schema:name "Advances in cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings"@en ;
    schema:numberOfPages "609" ;
    schema:productID "405546164" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/405546164#PublicationEvent/berlin_springer_2009> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/892062530#Agent/springer> ; # Springer
    schema:url <http://dx.doi.org/10.1007/978-3-642-01001-9> ;
    schema:workExample <http://worldcat.org/isbn/9783642010019> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/405546164> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/892062530#Meeting/eurocrypt_conference> # EUROCRYPT (Conference)
    a bgn:Meeting, schema:Event ;
    schema:name "EUROCRYPT (Conference)" ;
    .

<http://experiment.worldcat.org/entity/work/data/892062530#Place/koln_2009> # Köln <2009>
    a schema:Place ;
    schema:name "Köln <2009>" ;
    .

<http://experiment.worldcat.org/entity/work/data/892062530#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/405546164> ; # Advances in cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/892062530#Topic/computer_security> # Computer Security
    a schema:Intangible ;
    schema:name "Computer Security"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/892062530#Topic/computing_methodologies> # Computing Methodologies
    a schema:Intangible ;
    schema:name "Computing Methodologies"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/162770271> # Antoine Joux
    a schema:Person ;
    schema:familyName "Joux" ;
    schema:givenName "Antoine" ;
    schema:name "Antoine Joux" ;
    .

<http://worldcat.org/isbn/9783642010019>
    a schema:ProductModel ;
    schema:isbn "3642010016" ;
    schema:isbn "9783642010019" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/405546164> ; # Advances in cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/oclc/320198698>
    a schema:CreativeWork ;
    rdfs:label "Advances in cryptology - EUROCRYPT 2009." ;
    schema:description "Print version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/405546164> ; # Advances in cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings
    .

<http://www.worldcat.org/title/-/oclc/405546164>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/405546164> ; # Advances in cryptology - EUROCRYPT 2009 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 ; proceedings
    schema:dateModified "2015-07-12" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.