Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings Josef Pieprzyk ... (eds.)
Materialtyp: TextVerlagsnummer: 86192155Sprache: Englisch Reihen: ; 771200 | Lecture notes in computer science ; 7712Verlag: Berlin Heidelberg Springer 2012Beschreibung: XVI, 309 S. Ill., graph. Darst. 24 cmInhaltstyp:- Text
- ohne Hilfsmittel zu benutzen
- Band
- 3642354033
- 9783642354038
- QA76.9.A25
- SS 4800
- *68-06
- 68P25
- 94A60
- 00B25
- 54.38
- Archivierung/Langzeitarchivierung gewährleistet PEBW
Medientyp | Aktuelle Bibliothek | Sammlung | Standort | Signatur | Status | Fälligkeitsdatum | Barcode | |
---|---|---|---|---|---|---|---|---|
Buch | Gebäude E2 3 (UdS Campusbibliothek für Informatik und Mathematik) | Campusbibliothek für Informatik und Mathematik (E2 3) | Series (GF) | LNCS 7712 (Regal durchstöbern(Öffnet sich unterhalb)) | Verfügbar | 2200000324832 |
Literaturangaben
Cryptanalysis ; Conditional Differential Cryptanalysis of Grain-128a Michael Lehmann, Willi Meier
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2 Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
A Simple Key-Recovery Attack on McOE-X Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem Jun Xu, Lei Hu, Siwei Sun, Ping Wang
Biclique Cryptanalysis of TWINE Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys) Jorge Nakahara Jr.
Improved Linear Analysis on Block Cipher MULTI2 Yi Lu, Liping Ding, Yongji Wang
Fixed Points of Special Type and Cryptanalysis of Full GOST Orhun Kara, Ferhat Karakoç
Network Security ; Attacking Animated CAPTCHAs via Character Extraction Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs Orestis Tsigkas, Dimitrios Tzovaras
Mobile Evil Twin Malnets - The Worst of Both Worlds Christian Szongott, Benjamin Henne, Matthew Smith
Firm Grip Handshakes: A Tool for Bidirectional Vouching Omer Berkman, Benny Pinkas, Moti Yung
Cryptographic Protocols ; Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification Atsushi Fujioka, Taiichi Saito, Keita Xagawa
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
Fast and Private Computation of Cardinality of Set Intersection and Union Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
Encryption ; Fast and Secure Root Finding for Code-Based Cryptosystems Falko Strenzke
Strong Privacy for RFID Systems from Plaintext-Aware Encryption Khaled Ouafi, Serge Vaudenay
How to Enhance the Security on the Least Significant Bit Atsuko Miyaji, Yiren Mo
S-Box Theory ; Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions Mansoor Ahmed Khan, Ferruh Özbudak
Some Representations of the S-Box of Camellia in GF(((2²)²)²) Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores.
Cryptology and network security
Pieprzyk, Josef: Cryptology and Network Security
Pieprzyk, Josef: Cryptology and Network Security
Archivierung/Langzeitarchivierung gewährleistet PEBW pdager DE-31