skip to content
Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings Preview this item
ClosePreview this item
Checking...

Progress in cryptology-- INDOCRYPT 2012 : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings

Author: Steven D Galbraith; Mridul Nandi
Publisher: Berlin ; New York : Springer, ©2012.
Series: Lecture notes in computer science, 7668.; LNCS sublibrary., SL 4,, Security and cryptology.
Edition/Format:   eBook : Document : Conference publication : EnglishView all editions and formats
Database:WorldCat
Summary:
This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography,  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic books
Conference proceedings
Congresses
Additional Physical Format: Progress in cryptology
(NL-LeOCL)353763470
Material Type: Conference publication, Document, Internet resource
Document Type: Internet Resource, Computer File
All Authors / Contributors: Steven D Galbraith; Mridul Nandi
ISBN: 9783642349317 3642349315 3642349307 9783642349300
OCLC Number: 822995929
Notes: International conference proceedings.
Description: 1 online resource (xiii, 566 p.) : ill.
Contents: Invited Papers --
How to Compute on Encrypted Data / Vinod Vaikuntanathan --
From Multiple Encryption to Knapsacks - Efficient Dissection of Composite Problems / Orr Dunkelman --
Using the Cloud to Determine Key Strengths / Thorsten Kleinjung, Arjen K. Lenstra, Dan Page, Nigel P. Smart --
Protocol --
A Unified Characterization of Completeness and Triviality for Secure Function Evaluation / Hemanta K. Maji, Manoj Prabhakaran, Mike Rosulek --
On the Non-malleability of the Fiat-Shamir Transform / Sebastian Faust, Markulf Kohlweiss, Giorgia Azzurra Marson, Daniele Venturi --
Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 / Arpita Maitra, Goutam Paul --
On-Line/Off-Line Leakage Resilient Secure Computation Protocols / Chaya Ganesh, Vipul Goyal, Satya Lokam --
Side Channel --
Leakage Squeezing of Order Two / Claude Carlet, Jean-Luc Danger, Sylvain Guilley, Houssem Maghrebi --
ROSETTA for Single Trace Analysis / Christophe Clavier, Benoit Feix, Georges Gagnerot, Christophe Giraud, Mylène Roussellet --
Hash Functions and Stream Cipher --
Collision Attack on the Hamsi-256 Compression Function / Mario Lamberger, Florian Mendel, Vincent Rijmen --
Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks / Tuomas Kortelainen, Ari Vesanen, Juha Kortelainen --
A Differential Fault Attack on the Grain Family under Reasonable Assumptions / Subhadeep Banik, Subhamoy Maitra, Santanu Sarkar --
Cryptanalysis of Pseudo-random Generators Based on Vectorial FCSRs / Thierry P. Berger, Marine Minier --
Cryptanalysis of Block Ciphers --
Faster Chosen-Key Distinguishers on Reduced-Round AES / Patrick Derbez, Pierre-Alain Fouque, Jérémy Jean --
The Higher-Order Meet-in-the-Middle Attack and Its Application to the Camellia Block Cipher / Jiqiang Lu, Yongzhuang Wei, Jongsung Kim, Enes Pasalic --
Double-SP Is Weaker Than Single-SP: Rebound Attacks on Feistel Ciphers with Several Rounds / Yu Sasaki --
Automatic Search of Truncated Impossible Differentials for Word-Oriented Block Ciphers / Shengbao Wu, Mingsheng Wang --
Time Memory Trade-Off --
High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System / Jung Woo Kim, Jungjoo Seo, Jin Hong, Kunsoo Park, Sung-Ryul Kim --
Computing Small Discrete Logarithms Faster / Daniel J. Bernstein, Tanja Lange --
Hardware --
Embedded Syndrome-Based Hashing / Ingo von Maurich, Tim Güneysu --
Hardware --
Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA / Thomas Plos, Christoph Dobraunig, Markus Hofinger, Alexander Oprisnik --
Elliptic Curve --
Efficient Arithmetic on Elliptic Curves in Characteristic 2 / David Kohel --
A New Model of Binary Elliptic Curves / Hongfeng Wu, Chunming Tang, Rongquan Feng --
Analysis of Optimum Pairing Products at High Security Levels / Xusheng Zhang, Dongdai Lin --
Constructing Pairing-Friendly Genus 2 Curves with Split Jacobian / Robert Dryło --
Digital Signature --
Faster Batch Forgery Identification / Daniel J. Bernstein, Jeroen Doumen, Tanja Lange, Jan-Jaap Oosterwijk --
Implementing CFS / Gregory Landais, Nicolas Sendrier --
Symmetric Key Design and Provable Security --
SipHash: A Fast Short-Input PRF / Jean-Philippe Aumasson, Daniel J. Bernstein --
A Novel Permutation-Based Hash Mode of Operation FP and the Hash Function SAMOSA / Souradyuti Paul, Ekawat Homsirikamol, Kris Gaj --
Resistance against Adaptive Plaintext-Ciphertext Iterated Distinguishers / Aslı Bay, Atefeh Mashatan, Serge Vaudenay --
Sufficient Conditions on Padding Schemes of Sponge Construction and Sponge-Based Authenticated-Encryption Scheme / Donghoon Chang.
Series Title: Lecture notes in computer science, 7668.; LNCS sublibrary., SL 4,, Security and cryptology.
Other Titles: INDOCRYPT 2012
Responsibility: Steven Galbraith, Mridul Nandi (eds.).
More information:

Abstract:

This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/822995929> # Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "822995929" ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/1207077317#Place/berlin> ; # Berlin
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:about <http://dewey.info/class/005.82/e23/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/management_of_computing_and_information_systems> ; # Management of Computing and Information Systems.
    schema:about <http://id.worldcat.org/fast/872341> ; # Computer networks--Security measures
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/computer_communication_networks> ; # Computer Communication Networks.
    schema:about <http://id.worldcat.org/fast/887935> ; # Data encryption (Computer science)
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/algorithm_analysis_and_problem_complexity> ; # Algorithm Analysis and Problem Complexity.
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/data_encryption_computer_science> ; # Data encryption (Computer science).
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/data_protection> ; # Data protection.
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/computer_software> ; # Computer software.
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/systems_and_data_security> ; # Systems and Data Security.
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Topic/informatique> ; # Informatique
    schema:about <http://experiment.worldcat.org/entity/work/data/1207077317#Thing/computer_science> ; # Computer science.
    schema:alternateName "INDOCRYPT 2012" ;
    schema:bookFormat schema:EBook ;
    schema:contributor <http://viaf.org/viaf/306106271> ; # Mridul Nandi
    schema:contributor <http://viaf.org/viaf/53681076> ; # Steven D. Galbraith
    schema:copyrightYear "2012" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/1207077317#Meeting/international_conference_in_cryptology_in_india_13th_2012_kolkata_india> ; # International Conference in Cryptology in India (13th : 2012 : Kolkata, India)
    schema:datePublished "2012" ;
    schema:description "This book constitutes the refereed proceedings of the 12th International Conference on Cryptology in India, INDOCRYPT 2011, held in Chennai, India, in December 2011. The 22 revised full papers presented together with the abstracts of 3 invited talks and 3 tutorials were carefully reviewed and selected from 127 submissions. The papers are organized in topical sections on side-channel attacks, secret-key cryptography, hash functions, pairings, and protocols."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/1207077317> ;
    schema:genre "Conference publication"@en ;
    schema:genre "Electronic books"@en ;
    schema:genre "Conference proceedings"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1207077317#Series/lncs_sublibrary> ; # LNCS sublibrary.
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1207077317#Series/lncs_sublibrary_sl_4_security_and_cryptology> ; # LNCS sublibrary. SL 4, Security and cryptology
    schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science,
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/1207077317#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://worldcat.org/entity/work/data/1207077317#CreativeWork/progress_in_cryptology> ;
    schema:name "Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings"@en ;
    schema:numberOfPages "566" ;
    schema:productID "822995929" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/822995929#PublicationEvent/berlin_new_york_springer_c2012> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/1207077317#Agent/springer> ; # Springer
    schema:url <http://dx.doi.org/10.1007/978-3-642-34931-7> ;
    schema:workExample <http://worldcat.org/isbn/9783642349317> ;
    schema:workExample <http://dx.doi.org/10.1007/978-3-642-34931-7> ;
    schema:workExample <http://worldcat.org/isbn/9783642349300> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/822995929> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Meeting/international_conference_in_cryptology_in_india_13th_2012_kolkata_india> # International Conference in Cryptology in India (13th : 2012 : Kolkata, India)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/1207077317#Place/kolkata_india> ; # Kolkata, India)
    schema:name "International Conference in Cryptology in India (13th : 2012 : Kolkata, India)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Place/kolkata_india> # Kolkata, India)
    a schema:Place ;
    schema:name "Kolkata, India)" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/822995929> ; # Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Series/lncs_sublibrary> # LNCS sublibrary.
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/822995929> ; # Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
    schema:name "LNCS sublibrary." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Series/lncs_sublibrary_sl_4_security_and_cryptology> # LNCS sublibrary. SL 4, Security and cryptology
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/822995929> ; # Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
    schema:name "LNCS sublibrary. SL 4, Security and cryptology" ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/algorithm_analysis_and_problem_complexity> # Algorithm Analysis and Problem Complexity.
    a schema:Thing ;
    schema:name "Algorithm Analysis and Problem Complexity." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/computer_communication_networks> # Computer Communication Networks.
    a schema:Thing ;
    schema:name "Computer Communication Networks." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/computer_science> # Computer science.
    a schema:Thing ;
    schema:name "Computer science." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/computer_software> # Computer software.
    a schema:Thing ;
    schema:name "Computer software." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/data_encryption_computer_science> # Data encryption (Computer science).
    a schema:Thing ;
    schema:name "Data encryption (Computer science)." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/data_protection> # Data protection.
    a schema:Thing ;
    schema:name "Data protection." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/management_of_computing_and_information_systems> # Management of Computing and Information Systems.
    a schema:Thing ;
    schema:name "Management of Computing and Information Systems." ;
    .

<http://experiment.worldcat.org/entity/work/data/1207077317#Thing/systems_and_data_security> # Systems and Data Security.
    a schema:Thing ;
    schema:name "Systems and Data Security." ;
    .

<http://id.worldcat.org/fast/872341> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/887935> # Data encryption (Computer science)
    a schema:Intangible ;
    schema:name "Data encryption (Computer science)"@en ;
    .

<http://viaf.org/viaf/306106271> # Mridul Nandi
    a schema:Person ;
    schema:familyName "Nandi" ;
    schema:givenName "Mridul" ;
    schema:name "Mridul Nandi" ;
    .

<http://viaf.org/viaf/53681076> # Steven D. Galbraith
    a schema:Person ;
    schema:familyName "Galbraith" ;
    schema:givenName "Steven D." ;
    schema:name "Steven D. Galbraith" ;
    .

<http://worldcat.org/entity/work/data/1207077317#CreativeWork/progress_in_cryptology>
    a schema:CreativeWork ;
    rdfs:label "Progress in cryptology" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/822995929> ; # Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
    .

<http://worldcat.org/isbn/9783642349300>
    a schema:ProductModel ;
    schema:description "print" ;
    schema:isbn "3642349307" ;
    schema:isbn "9783642349300" ;
    .

<http://worldcat.org/isbn/9783642349317>
    a schema:ProductModel ;
    schema:description "electronic bk." ;
    schema:isbn "3642349315" ;
    schema:isbn "9783642349317" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science,
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/822995929> ; # Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
    schema:issn "0302-9743" ;
    schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/822995929>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/822995929> ; # Progress in cryptology-- INDOCRYPT 2012 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012, proceedings
    schema:dateModified "2015-04-26" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.