feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV040442372
    Format: XI, 582 S. : , graph. Darst. ; , 24 cm.
    ISBN: 978-3-642-32927-2
    Series Statement: Lecture notes in computer science 7485
    Note: Literaturangaben
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-642-32928-9
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Rechnernetz ; Kryptologie ; Authentifikation ; Sicherheitsprotokoll ; Schlüsselverteilung ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    Author information: Visconti, Ivan.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV040523012
    Format: 1 Online-Ressource (XI, 582 S.) , graph. Darst. , 24 cm
    ISBN: 9783642329289
    Series Statement: Lecture notes in computer science 7485
    Note: Literaturangaben
    Additional Edition: Erscheint auch als Druck-Ausgabe, Paperback ISBN 978-3-642-32927-2
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptoanalyse ; Computersicherheit ; Datensicherung ; Rechnernetz ; Kryptologie ; Authentifikation ; Sicherheitsprotokoll ; Schlüsselverteilung ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Visconti, Ivan
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almahu_9947364308802882
    Format: XI, 423 p. , online resource.
    ISBN: 9783540858553
    Series Statement: Lecture Notes in Computer Science, 5229
    Content: This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
    Note: Invited Talk -- Storage Encryption: A Cryptographer’s View -- Session 1: Implementations -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A Cryptographic Link Layer for Local Area Networks -- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification -- Session 2: Protocols I -- Privacy Preserving Data Mining within Anonymous Credential Systems -- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function -- Session 3: Encryption I -- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications -- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption -- Session 4: Encryption II -- General Certificateless Encryption and Timed-Release Encryption -- Efficient Certificate-Based Encryption in the Standard Model -- Session 5: Primitives -- An Improved Robust Fuzzy Extractor -- On Linear Secret Sharing for Connectivity in Directed Graphs -- Session 6: Signatures -- Expressive Subgroup Signatures -- Anonymous Proxy Signatures -- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact Hardware Implementations of the AES S-Box -- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes -- Full Cryptanalysis of LPS and Morgenstern Hash Functions -- A New DPA Countermeasure Based on Permutation Tables -- Session 8: Protocols II -- Simplified Submission of Inputs to Protocols -- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited -- Session 9: Encryption III -- Linear Bandwidth Naccache-Stern Encryption -- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment -- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) -- Session 10: Key Exchange -- New Anonymity Notions for Identity-Based Encryption -- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort -- An Identity-Based Key Agreement Protocol for the Network Layer.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540858546
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_1647400473
    Format: Online-Ressource (digital)
    ISBN: 9783540858553
    Series Statement: Lecture Notes in Computer Science 5229
    Content: Invited Talk -- Storage Encryption: A Cryptographer’s View -- Session 1: Implementations -- Implementing Two-Party Computation Efficiently with Security Against Malicious Adversaries -- CLL: A Cryptographic Link Layer for Local Area Networks -- Faster Multi-exponentiation through Caching: Accelerating (EC)DSA Signature Verification -- Session 2: Protocols I -- Privacy Preserving Data Mining within Anonymous Credential Systems -- Improved Privacy of the Tree-Based Hash Protocols Using Physically Unclonable Function -- Session 3: Encryption I -- Two Generic Constructions of Probabilistic Cryptosystems and Their Applications -- Cramer-Shoup Satisfies a Stronger Plaintext Awareness under a Weaker Assumption -- Session 4: Encryption II -- General Certificateless Encryption and Timed-Release Encryption -- Efficient Certificate-Based Encryption in the Standard Model -- Session 5: Primitives -- An Improved Robust Fuzzy Extractor -- On Linear Secret Sharing for Connectivity in Directed Graphs -- Session 6: Signatures -- Expressive Subgroup Signatures -- Anonymous Proxy Signatures -- Multisignatures Using Proofs of Secret Key Possession, as Secure as the Diffie-Hellman Problem -- Session 7: Hardware and Cryptanalysis -- Using Normal Bases for Compact Hardware Implementations of the AES S-Box -- A New Analysis of the McEliece Cryptosystem Based on QC-LDPC Codes -- Full Cryptanalysis of LPS and Morgenstern Hash Functions -- A New DPA Countermeasure Based on Permutation Tables -- Session 8: Protocols II -- Simplified Submission of Inputs to Protocols -- Unconditionally Reliable and Secure Message Transmission in Directed Networks Revisited -- Session 9: Encryption III -- Linear Bandwidth Naccache-Stern Encryption -- Immunising CBC Mode Against Padding Oracle Attacks: A Formal Security Treatment -- Constructing Strong KEM from Weak KEM (or How to Revive the KEM/DEM Framework) -- Session 10: Key Exchange -- New Anonymity Notions for Identity-Based Encryption -- A Universally Composable Group Key Exchange Protocol with Minimum Communication Effort -- An Identity-Based Key Agreement Protocol for the Network Layer.
    Content: This book constitutes the refereed proceedings of the 6th International Conference on Security and Cryptology for Networks, SCN 2008, held in Amalfi, Italy, in September 2008. The book contains one invited talk and 26 revised full papers which were carefully reviewed and selected from 71 submissions. The papers are organized in topical sections on Implementations, Protocols, Encryption, Primitives, Signatures, Hardware and Cryptanalysis, and Key Exchange.
    Additional Edition: ISBN 9783540858546
    Additional Edition: Buchausg. u.d.T. Security and cryptography for networks Berlin : Springer, 2008 ISBN 3540858547
    Additional Edition: ISBN 9783540858546
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Rechnernetz ; Kryptologie ; Rechnernetz ; Computersicherheit ; Datensicherung ; Verteiltes System ; Advanced Encryption Standard ; Rechnernetz ; Sicherheitsprotokoll ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Author information: Nierstrasz, Oscar 1957-
    Author information: Pandu Rangan, C. 1955-
    Author information: Mattern, Friedemann 1955-
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9947364490102882
    Format: XI, 582 p. 75 illus. , online resource.
    ISBN: 9783642329289
    Series Statement: Lecture Notes in Computer Science, 7485
    Content: This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
    Note: Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642329272
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages