Atjaunināt sīkdatņu piekrišanu

E-grāmata: Cryptography and Coding: 11th IMA International Conference, Cirencester, UK, December 18-20, 2007, Proceedings

  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 4887
  • Izdošanas datums: 06-Dec-2007
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540772729
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Security and Cryptology 4887
  • Izdošanas datums: 06-Dec-2007
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540772729
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with two invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.
Invited Papers
Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise
1(15)
Jonathan Katz
Galois Rings and Pseudo-random Sequences
16(18)
Patrick Sole
Dmitrii Zinoviev
Signatures I
Finding Invalid Signatures in Pairing-Based Batches
34(20)
Laurie Law
Brian J. Matt
How to Forge a Time-Stamp Which Adobe's Acrobat Accepts
54(19)
Tetsuya Izu
Takeshi Shimoyama
Masahiko Takenaka
Boolean Functions
Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions
73(19)
Nicholas Kolokotronis
Konstantinos Limniotis
Nicholas Kalouptsidis
On the Walsh Spectrum of a New APN Function
92(7)
Carl Bracken
Eimear Byrne
Nadya Markin
Gary McGuire
Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes
99(19)
Juan M.E. Tapiador
John A. Clark
Julio C. Hernandez-Castro
Block Cipher Cryptanalysis
Cryptanalysis of the EPBC Authenticated Encryption Mode
118(11)
Chris J. Mitchell
Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption
129(23)
Gregory V. Bard
Algebraic Cryptanalysis of the Data Encryption Standard
152(18)
Nicolas T. Courtois
Gregory V. Bard
Side Channels
Cryptographic Side-Channels from Low Power Cache Memory
170(15)
Philipp Grabher
Johann Grobschadl
Daniel Page
New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures
185(19)
Onur Aclicmez
Shay Gueron
Jean-Pierre Seifert
Linear Complexity
Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity
204(16)
Panagiotis Rizomiliotis
Modified Berlekamp-Massey Algorithm for Approximating the k-Error Linear Complexity of Binary Sequences
220(13)
Alexandra Alecu
Ana Salagean
Public Key Encryption
Efficient KEMs with Partial Message Recovery
233(24)
Tor E. Bjorstad
Alex W. Dent
Nigel P. Smart
Randomness Reuse:Extensions and Improvements
257(20)
Manuel Barbosa
Pooya Farshim
On the Connection Between Signcryption and One-Pass Key Establishment
277(25)
M. Choudary Gorantla
Colin Boyd
Juan Manuel Gonzalez Nieto
Curves
Optimised Versions of the Ate and Twisted Ate Pairings
302(11)
Seiichi Matsuda
Naoki Kanayama
Florian Hess
Eiji Okamoto
Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic
313(23)
Reza Rezaeian Farashahi
Constructing Pairing-Friendly Elliptic Curves Using Grobner Basis Reduction
336(10)
Waldyr D. Benits Junior
Steven D. Galbraith
RSA Implementation
Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic
346(18)
Kamel Bentahar
Nigel P. Smart
Toward Acceleration of RSA Using 3D Graphics Hardware
364(20)
Andrew Moss
Daniel Page
Nigel P. Smart
Signatures II
Multi-key Hierarchical Identity-Based Signatures
384(19)
Hoon Wei Lim
Kenneth G. Paterson
Verifier-Key-Flexible Universal Designated-Verifier Signatures
403(20)
Raylin Tso
Juan Manuel Gonzalez Nieto
Takeshi Okamoto
Colin Boyd
Eiji Okamoto
Author Index 423