000 | 04504nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-319-22174-8 | ||
003 | DE-He213 | ||
005 | 20240730172551.0 | ||
007 | cr nn 008mamaa | ||
008 | 150814s2015 sz | s |||| 0|eng d | ||
020 |
_a9783319221748 _9978-3-319-22174-8 |
||
024 | 7 |
_a10.1007/978-3-319-22174-8 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProgress in Cryptology -- LATINCRYPT 2015 _h[electronic resource] : _b4th International Conference on Cryptology and Information Security in Latin America, Guadalajara, Mexico, August 23-26, 2015, Proceedings / _cedited by Kristin Lauter, Francisco Rodríguez-Henríquez. |
250 | _a1st ed. 2015. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2015. |
|
300 |
_aXII, 385 p. 35 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v9230 |
|
505 | 0 | _aCryptographic Protocols -- Efficient RKA-Secure KEM and IBE Schemes Against Invertible Functions -- Simulation-Based Secure Functional Encryption in the Random Oracle Model -- The Simplest Protocol for Oblivious Transfer -- Foundations -- Depth Optimized Efficient Homomorphic Sorting -- The Chain Rule for HILL Pseudoentropy, Revisited -- Post-Quantum Cryptography -- Faster Sieving for Shortest Lattice Vectors Using Spherical Locality-Sensitive Hashing -- FHEW with Efficient Multibit Bootstrapping -- Symmetric Key Cryptanalysis -- Improved Top-Down Techniques in Differential Cryptanalysis -- Algebraic Analysis of the Simon Block Cipher Family -- Cryptanalysis of the Full 8.5-Round REESSE3+ Block Cipher -- Meet-in-the-Middle Attacks on Reduced-Round Hierocrypt-3 -- State-Recovery Analysis of Spritz -- We Still Love Pairings Computing Optimal 2-3 Chains for Pairings -- Subgroup Security in Pairing-Based Cryptography -- Curves in Cryptography -- Twisted Hessian Curves -- Improved Sieving on Algebraic Curves -- Attacking a Binary GLS Elliptic Curve with Magma -- Cryptographic Engineering -- Fast Implementation of Curve25519 Using AVX2 -- High-Performance Ideal Lattice-Based Cryptography on 8-Bit ATxmega Microcontrollers -- An Efficient Software Implementation of the Hash-Based Signature Scheme MSS and Its Variants. | |
520 | _aThis book constitutes the proceedings of the 4th International Conference on Cryptology and Information Security in Latin America, LatinCrypt 2015, held in Guadalajara, Mexico, in August 2015. The 20 papers presented were carefully reviewed and selected from 49 submissions. They were organized in topical sections named: cryptographic protocols; foundations; post-quantum cryptography; symmetric key cryptanalysis; we still love pairings; curves in cryptography; and cryptographic engineering. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aDiscrete mathematics. _912873 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aComputers and civilization. _921733 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9104326 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _931837 |
650 | 2 | 4 |
_aCoding and Information Theory. _9104330 |
650 | 2 | 4 |
_aComputers and Society. _931668 |
700 | 1 |
_aLauter, Kristin. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9104333 |
|
700 | 1 |
_aRodríguez-Henríquez, Francisco. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9104335 |
|
710 | 2 |
_aSpringerLink (Online service) _9104337 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319221731 |
776 | 0 | 8 |
_iPrinted edition: _z9783319221755 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v9230 _9104339 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-22174-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c88389 _d88389 |