Atjaunināt sīkdatņu piekrišanu

Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings 2007 ed. [Mīkstie vāki]

  • Formāts: Paperback / softback, 426 pages, height x width: 235x155 mm, weight: 670 g, XI, 426 p., 1 Paperback / softback
  • Sērija : Security and Cryptology 4887
  • Izdošanas datums: 10-Dec-2007
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540772715
  • ISBN-13: 9783540772712
Citas grāmatas par šo tēmu:
  • Mīkstie vāki
  • Cena: 46,91 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Standarta cena: 55,19 €
  • Ietaupiet 15%
  • Grāmatu piegādes laiks ir 3-4 nedēļas, ja grāmata ir uz vietas izdevniecības noliktavā. Ja izdevējam nepieciešams publicēt jaunu tirāžu, grāmatas piegāde var aizkavēties.
  • Daudzums:
  • Ielikt grozā
  • Piegādes laiks - 4-6 nedēļas
  • Pievienot vēlmju sarakstam
  • Formāts: Paperback / softback, 426 pages, height x width: 235x155 mm, weight: 670 g, XI, 426 p., 1 Paperback / softback
  • Sērija : Security and Cryptology 4887
  • Izdošanas datums: 10-Dec-2007
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540772715
  • ISBN-13: 9783540772712
Citas grāmatas par šo tēmu:
This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.
Invited Papers
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
1(15)
Jonathan Katz
Galois Rings and Pseudo-random Sequences
16(18)
Patrick Sole
Dmitrii Zinoviev
Signatures I
Finding Invalid Signatures in Pairing-Based Batches
34(20)
Laurie Law
Brian J. Matt
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts
54(19)
Tetsuya Izu
Takeshi Shimoyama
Masahiko Takenaka
Boolean Functions
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions
73(19)
Nicholas Kolokotronis
Konstantinos Limniotis
Nicholas Kalouptsidis
On the Walsh Spectrum of a New APN Function
92(7)
Carl Bracken
Eimear Byrne
Nadya Markin
Gary McGuire
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
99(19)
Juan M.E. Tapiador
John A. Clark
Julio C. Hernandez-Castro
Block Cipher Cryptanalysis
Cryptanalysis of the EPBC Authenticated Encryption Mode
118(11)
Chris J. Mitchell
Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption
129(23)
Gregory V. Bard
Algebraic Cryptanalysis of the Data Encryption Standard
152(18)
Nicolas T. Courtois
Gregory V. Bard
Side Channels
Cryptographic Side-Channels from Low Power Cache Memory
170(15)
Philipp Grabher
Johann Grobschadl
Daniel Page
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
185(19)
Onur Aclicmez
Shay Gueron
Jean-Pierre Seifert
Linear Complexity
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity
204(16)
Panagiotis Rizomiliotis
Modified Berlekamp-Massey Algorithm for Approximating the k-Error Linear Complexity of Binary Sequences
220(13)
Alexandra Alecu
Ana Salagean
Public Key Encryption
Efficient KEMs with Partial Message Recovery
233(24)
Tor E. Bjorstad
Alex W. Dent
Nigel P. Smart
Randomness Reuse:Extensions and Improvements
257(20)
Manuel Barbosa
Pooya Farshim
On the Connection Between Signcryption and One-Pass Key Establishment
277(25)
M. Choudary Gorantla
Colin Boyd
Juan Manuel Gonzalez Nieto
Curves
Optimised Versions of the Ate and Twisted Ate Pairings
302(11)
Seiichi Matsuda
Naoki Kanayama
Florian Hess
Eiji Okamoto
Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic
313(23)
Reza Rezaeian Farashahi
Constructing Pairing-Friendly Elliptic Curves Using Grobner Basis Reduction
336(10)
Waldyr D. Benits Junior
Steven D. Galbraith
RSA Implementation
Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic
346(18)
Kamel Bentahar
Nigel P. Smart
Toward Acceleration of RSA Using 3D Graphics Hardware
364(20)
Andrew Moss
Daniel Page
Nigel P. Smart
Signatures II
Multi-key Hierarchical Identity-Based Signatures
384(19)
Hoon Wei Lim
Kenneth G. Paterson
Verifier-Key-Flexible Universal Designated-Verifier Signatures
403(20)
Raylin Tso
Juan Manuel Gonzalez Nieto
Takeshi Okamoto
Colin Boyd
Eiji Okamoto
Author Index 423