Campusbibliothek
Normale Ansicht MARC ISBD

Cryptology and network security 11th international conference, CANS 2012, Darmstadt, Germany, December 12 - 14, 2012 ; proceedings Josef Pieprzyk ... (eds.)

Mitwirkende(r): Materialtyp: TextTextVerlagsnummer: 86192155Sprache: Englisch Reihen: ; 771200 | Lecture notes in computer science ; 7712Verlag: Berlin Heidelberg Springer 2012Beschreibung: XVI, 309 S. Ill., graph. Darst. 24 cmInhaltstyp:
  • Text
Medientyp:
  • ohne Hilfsmittel zu benutzen
Datenträgertyp:
  • Band
ISBN:
  • 3642354033
  • 9783642354038
Schlagwörter: Genre/Form: Andere physische Formen: Kein Titel; Online-Ausg.: Cryptology and Network Security; Erscheint auch als: Cryptology and Network SecurityLOC-Klassifikation:
  • QA76.9.A25
Andere Klassifikation:
  • SS 4800
  • *68-06
  • 68P25
  • 94A60
  • 00B25
  • 54.38
Online-Ressourcen:
Inhalte:
Cryptanalysis ; Conditional Differential Cryptanalysis of Grain-128a Michael Lehmann, Willi Meier
A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2 Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu
A Simple Key-Recovery Attack on McOE-X Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser
Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem Jun Xu, Lei Hu, Siwei Sun, Ping Wang
Biclique Cryptanalysis of TWINE Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş
Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys) Jorge Nakahara Jr.
Improved Linear Analysis on Block Cipher MULTI2 Yi Lu, Liping Ding, Yongji Wang
Fixed Points of Special Type and Cryptanalysis of Full GOST Orhun Kara, Ferhat Karakoç
Network Security ; Attacking Animated CAPTCHAs via Character Extraction Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo
Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs Orestis Tsigkas, Dimitrios Tzovaras
Mobile Evil Twin Malnets - The Worst of Both Worlds Christian Szongott, Benjamin Henne, Matthew Smith
Firm Grip Handshakes: A Tool for Bidirectional Vouching Omer Berkman, Benny Pinkas, Moti Yung
Cryptographic Protocols ; Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona
Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification Atsushi Fujioka, Taiichi Saito, Keita Xagawa
LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede
Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa
Fast and Private Computation of Cardinality of Set Intersection and Union Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik
Encryption ; Fast and Secure Root Finding for Code-Based Cryptosystems Falko Strenzke
Strong Privacy for RFID Systems from Plaintext-Aware Encryption Khaled Ouafi, Serge Vaudenay
How to Enhance the Security on the Least Significant Bit Atsuko Miyaji, Yiren Mo
S-Box Theory ; Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions Mansoor Ahmed Khan, Ferruh Özbudak
Some Representations of the S-Box of Camellia in GF(((2²)²)²) Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores.
Bearbeitungsvermerk:
  • Archivierung/Langzeitarchivierung gewährleistet PEBW
Andere Ausgaben: Erscheint auch als (Online-Ausgabe): / Cryptology and network security; Erscheint auch als (Online-Ausgabe): / Pieprzyk, Josef: Cryptology and Network Security; Online-Ausg.: / Pieprzyk, Josef: Cryptology and Network Security
Exemplare
Medientyp Aktuelle Bibliothek Sammlung Standort Signatur Status Fälligkeitsdatum Barcode
Buch Buch Gebäude E2 3 (UdS Campusbibliothek für Informatik und Mathematik) Campusbibliothek für Informatik und Mathematik (E2 3) Series (GF) LNCS 7712 (Regal durchstöbern(Öffnet sich unterhalb)) Verfügbar 2200000324832

Literaturangaben

Cryptanalysis ; Conditional Differential Cryptanalysis of Grain-128a Michael Lehmann, Willi Meier

A Real-Time Key Recovery Attack on the Lightweight Stream Cipher A2U2 Zhenqing Shi, Xiutao Feng, Dengguo Feng, Chuankun Wu

A Simple Key-Recovery Attack on McOE-X Florian Mendel, Bart Mennink, Vincent Rijmen, Elmar Tischhauser

Cryptanalysis of a Lattice-Knapsack Mixed Public Key Cryptosystem Jun Xu, Lei Hu, Siwei Sun, Ping Wang

Biclique Cryptanalysis of TWINE Mustafa Çoban, Ferhat Karakoç, Özkan Boztaş

Differential and Linear Attacks on the Full WIDEA-n Block Ciphers (under Weak Keys) Jorge Nakahara Jr.

Improved Linear Analysis on Block Cipher MULTI2 Yi Lu, Liping Ding, Yongji Wang

Fixed Points of Special Type and Cryptanalysis of Full GOST Orhun Kara, Ferhat Karakoç

Network Security ; Attacking Animated CAPTCHAs via Character Extraction Vu Duc Nguyen, Yang-Wai Chow, Willy Susilo

Analysis of Rogue Anti-Virus Campaigns Using Hidden Structures in k-Partite Graphs Orestis Tsigkas, Dimitrios Tzovaras

Mobile Evil Twin Malnets - The Worst of Both Worlds Christian Szongott, Benjamin Henne, Matthew Smith

Firm Grip Handshakes: A Tool for Bidirectional Vouching Omer Berkman, Benny Pinkas, Moti Yung

Cryptographic Protocols ; Group Key Establishment: Adding Perfect Forward Secrecy at the Cost of One Round Kashi Neupane, Rainer Steinwandt, Adriana Suárez Corona

Applicability of OR-Proof Techniques to Hierarchical Identity-Based Identification Atsushi Fujioka, Taiichi Saito, Keita Xagawa

LiBrA-CAN: A Lightweight Broadcast Authentication Protocol for Controller Area Networks Bogdan Groza, Stefan Murvay, Anthony van Herrewege, Ingrid Verbauwhede

Efficient Verification of Input Consistency in Server-Assisted Secure Function Evaluation Vladimir Kolesnikov, Ranjit Kumaresan, Abdullatif Shikfa

Fast and Private Computation of Cardinality of Set Intersection and Union Emiliano De Cristofaro, Paolo Gasti, Gene Tsudik

Encryption ; Fast and Secure Root Finding for Code-Based Cryptosystems Falko Strenzke

Strong Privacy for RFID Systems from Plaintext-Aware Encryption Khaled Ouafi, Serge Vaudenay

How to Enhance the Security on the Least Significant Bit Atsuko Miyaji, Yiren Mo

S-Box Theory ; Improvement in Non-linearity of Carlet-Feng Infinite Class of Boolean Functions Mansoor Ahmed Khan, Ferruh Özbudak

Some Representations of the S-Box of Camellia in GF(((2²)²)²) Alberto F. Martínez-Herrera, J. Carlos Mex-Perera, Juan A. Nolazco-Flores.

Cryptology and network security

Pieprzyk, Josef: Cryptology and Network Security

Pieprzyk, Josef: Cryptology and Network Security

Archivierung/Langzeitarchivierung gewährleistet PEBW pdager DE-31

Impressum

Datenschutzhinweise

Powered by Koha