Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_BV017886386
    Umfang: XI, 386 S.
    ISBN: 3-540-20996-4
    Serie: Lecture notes in computer science 2964
    Anmerkung: Includes bibliographical references and index
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Konferenzschrift ; Kongress
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9947920711202882
    Umfang: XII, 392 p. , online resource.
    ISBN: 9783540246602
    Serie: Lecture Notes in Computer Science, 2964
    Inhalt: The Cryptographers’ Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers’ Track, and it is now an established venue for presenting practical research results related to cryptography and data security. The conference received 77 submissions, and the program committee sel- ted 28 of these for presentation. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryp- graphy. Each paper was reviewed by at least three program committee members. Extended abstracts of the revised versions of these papers are in these proc- dings. The program also included two invited lectures by Dan Boneh and Silvio Micali. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection. Many of them attended the program committee meeting during the Crypto 2003 conference at the University of California, Santa Barbara.
    Anmerkung: Symmetric Encryption -- Online Encryption Schemes: New Security Notions and Constructions -- Related-Key Attacks on Triple-DES and DESX Variants -- Design of AES Based on Dual Cipher and Composite Field -- Periodic Properties of Counter Assisted Stream Ciphers -- A Fast Correlation Attack via Unequal Error Correcting LDPC Codes -- Aymmetric Encryption -- k-Resilient Identity-Based Encryption in the Standard Model -- A Generic Construction for Intrusion-Resilient Public-Key Encryption -- Digital Signatures -- A Certificate-Based Signature Scheme -- Identity Based Undeniable Signatures -- Compressing Rabin Signatures -- Protocols -- A Key Recovery System as Secure as Factoring -- Server Assisted Signatures Revisited -- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt ‘95 -- Universal Re-encryption for Mixnets -- Bit String Commitment Reductions with a Non-zero Rate -- Improving Robustness of PGP Keyrings by Conflict Detection -- Side-Channel Attacks -- Issues of Security with the Oswald-Aigner Exponentiation Algorithm -- Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness -- Self-Randomized Exponentiation Algorithms -- Hardwares -- Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems -- High-Speed Modular Multiplication -- Yet Another Sieving Device -- Mode of Operations -- A Parallelizable Enciphering Mode -- Padding Oracle Attacks on the ISO CBC Mode Encryption Standard -- Hash and Hash Chains -- A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512 -- Fast Verification of Hash Chains -- Visual Cryptography -- Almost Ideal Contrast Visual Cryptography with Reversing -- Ellictic Curve Cryptosystems -- Weak Fields for ECC.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540209966
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    gbv_744965128
    Umfang: Online-Ressource (XII, 392 p) , digital
    Ausgabe: Springer eBook Collection. Computer Science
    ISBN: 9783540246602 , 3540209964 , 9783540209966
    Serie: Lecture Notes in Computer Science 2964
    Inhalt: This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2004, CT-RSA 2004, held in San Francisco, CA, USA in February 2004. The 28 revised full papers presented were carefully reviewed and selected from 77 submissions. The papers are organized in topical sections on symmetric encryption, asymmetric encryption, digital signatures, protocols, side-channel attacks, hardware, modes of operation, hash and hash chains, visual cryptography, and elliptic curve cryptosystems
    Anmerkung: Includes bibliographical references and index
    Weitere Ausg.: ISBN 9783540209966
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9783662183366
    Weitere Ausg.: Erscheint auch als Druck-Ausgabe ISBN 9783540209966
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    almahu_9948621369302882
    Umfang: XII, 392 p. , online resource.
    Ausgabe: 1st ed. 2004.
    ISBN: 9783540246602
    Serie: Lecture Notes in Computer Science, 2964
    Inhalt: The Cryptographers' Track (CT-RSA) is a research conference within the RSA conference, the largest, regularly staged computer security event. CT-RSA 2004 was the fourth year of the Cryptographers' Track, and it is now an established venue for presenting practical research results related to cryptography and data security. The conference received 77 submissions, and the program committee sel- ted 28 of these for presentation. The program committee worked very hard to evaluate the papers with respect to quality, originality, and relevance to cryp- graphy. Each paper was reviewed by at least three program committee members. Extended abstracts of the revised versions of these papers are in these proc- dings. The program also included two invited lectures by Dan Boneh and Silvio Micali. I am extremely grateful to the program committee members for their en- mous investment of time and e?ort in the di?cult and delicate process of review and selection. Many of them attended the program committee meeting during the Crypto 2003 conference at the University of California, Santa Barbara.
    Anmerkung: Symmetric Encryption -- Online Encryption Schemes: New Security Notions and Constructions -- Related-Key Attacks on Triple-DES and DESX Variants -- Design of AES Based on Dual Cipher and Composite Field -- Periodic Properties of Counter Assisted Stream Ciphers -- A Fast Correlation Attack via Unequal Error Correcting LDPC Codes -- Aymmetric Encryption -- k-Resilient Identity-Based Encryption in the Standard Model -- A Generic Construction for Intrusion-Resilient Public-Key Encryption -- Digital Signatures -- A Certificate-Based Signature Scheme -- Identity Based Undeniable Signatures -- Compressing Rabin Signatures -- Protocols -- A Key Recovery System as Secure as Factoring -- Server Assisted Signatures Revisited -- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt '95 -- Universal Re-encryption for Mixnets -- Bit String Commitment Reductions with a Non-zero Rate -- Improving Robustness of PGP Keyrings by Conflict Detection -- Side-Channel Attacks -- Issues of Security with the Oswald-Aigner Exponentiation Algorithm -- Hardware Countermeasures against DPA - A Statistical Analysis of Their Effectiveness -- Self-Randomized Exponentiation Algorithms -- Hardwares -- Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems -- High-Speed Modular Multiplication -- Yet Another Sieving Device -- Mode of Operations -- A Parallelizable Enciphering Mode -- Padding Oracle Attacks on the ISO CBC Mode Encryption Standard -- Hash and Hash Chains -- A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512 -- Fast Verification of Hash Chains -- Visual Cryptography -- Almost Ideal Contrast Visual Cryptography with Reversing -- Ellictic Curve Cryptosystems -- Weak Fields for ECC.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662183366
    Weitere Ausg.: Printed edition: ISBN 9783540209966
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    gbv_378497499
    Umfang: XI, 386 S. , graph. Darst.
    ISBN: 3540209964
    Serie: Lecture notes in computer science 2964
    Anmerkung: Includes bibliographical references and index
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Okamoto, Tatsuaki, 1952 - Topics in Cryptology -- CT-RSA 2004 Berlin, Heidelberg : Springer Berlin Heidelberg, 2004 ISBN 9783540209966
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Elektronische Unterschrift ; Datensicherung ; Konferenzschrift
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540202936?
Meinten Sie 9783540201946?
Meinten Sie 9783540204916?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz