000 | 04410nam a22006975i 4500 | ||
---|---|---|---|
001 | 978-3-642-33481-8 | ||
003 | DE-He213 | ||
005 | 20240730182952.0 | ||
007 | cr nn 008mamaa | ||
008 | 120822s2012 gw | s |||| 0|eng d | ||
020 |
_a9783642334818 _9978-3-642-33481-8 |
||
024 | 7 |
_a10.1007/978-3-642-33481-8 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProgress in Cryptology - LATINCRYPT 2012 _h[electronic resource] : _b2nd International Conference on Cryptology and Information Security in Latin America, Santiago, Chile, October 7-10, 2012, Proceedings / _cedited by Alejandro Hevia, Gregory Neven. |
250 | _a1st ed. 2012. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2012. |
|
300 |
_aXII, 323 p. 26 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v7533 |
|
505 | 0 | _aIndifferentiable Hashing to Barreto-Naehrig Curves -- Semi-bent Functions with Multiple Trace Terms and Hyperelliptic Curves -- Complete Atomic Blocks for Elliptic Curves in Jacobian Coordinates over Prime Fields -- Message-Based Traitor Tracing with Optimal Ciphertext Rate -- Leakage-Resilient Spatial Encryption -- On the Pseudorandom Function Assumption in (Secure) Distance- Bounding Protocols: PRF-ness alone Does Not Stop the Frauds! -- Lattice-Based Hierarchical Inner Product Encryption -- Towards Efficient Arithmetic for Lattice-Based Cryptography on Reconfigurable Hardware -- The Security Impact of a New Cryptographic Library -- Faster Implementation of Scalar Multiplication on Koblitz Curves -- Zero-Knowledge for Multivariate Polynomials -- Improved Exponentiation and Key Agreement in the Infrastructure of a Real Quadratic Field -- UOWHFs from OWFs: Trading Regularity for Efficiency -- Random Mappings with Restricted Preimages -- On the Sosemanuk Related Key-IV Sets -- High Speed Implementation of Authenticated Encryption for the MSP430X Microcontroller -- Infective Computation and Dummy Rounds: Fault Protection for Block Ciphers without Check-before-Output. | |
520 | _aThis book constitutes the proceedings of the 2nd International Conference on Cryptology and Information Security in Latin America, LATINCRYPT 2012, held in Santiago, Chile, on October 7-10, 2012. The 17 papers presented together with four invited talks and one student poster session were carefully reviewed and selected from 47 submissions. The papers are organized in topical sections on elliptic curves, cryptographic protocols, implementations, foundations, and symmetric-key cryptography. | ||
650 | 0 |
_aCryptography. _91973 |
|
650 | 0 |
_aData encryption (Computer science). _99168 |
|
650 | 0 |
_aData protection. _97245 |
|
650 | 0 |
_aComputer networks . _931572 |
|
650 | 0 |
_aComputer science _xMathematics. _93866 |
|
650 | 0 |
_aDiscrete mathematics. _912873 |
|
650 | 0 |
_aCoding theory. _94154 |
|
650 | 0 |
_aInformation theory. _914256 |
|
650 | 0 |
_aImage processing _xDigital techniques. _94145 |
|
650 | 0 |
_aComputer vision. _9129892 |
|
650 | 1 | 4 |
_aCryptology. _931769 |
650 | 2 | 4 |
_aData and Information Security. _931990 |
650 | 2 | 4 |
_aComputer Communication Networks. _9129893 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _931837 |
650 | 2 | 4 |
_aCoding and Information Theory. _9129894 |
650 | 2 | 4 |
_aComputer Imaging, Vision, Pattern Recognition and Graphics. _931569 |
700 | 1 |
_aHevia, Alejandro. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9129895 |
|
700 | 1 |
_aNeven, Gregory. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _9129896 |
|
710 | 2 |
_aSpringerLink (Online service) _9129897 |
|
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783642334801 |
776 | 0 | 8 |
_iPrinted edition: _z9783642334825 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v7533 _9129898 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-642-33481-8 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cELN | ||
999 |
_c91593 _d91593 |