000 04558nam a22006615i 4500
001 978-3-642-17401-8
003 DE-He213
005 20240730193022.0
007 cr nn 008mamaa
008 101201s2010 gw | s |||| 0|eng d
020 _a9783642174018
_9978-3-642-17401-8
024 7 _a10.1007/978-3-642-17401-8
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aProgress in Cryptology - INDOCRYPT 2010
_h[electronic resource] :
_b11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings /
_cedited by Guang Gong, Kishan Chand Gupta.
250 _a1st ed. 2010.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2010.
300 _aXVI, 366 p. 63 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v6498
505 0 _aInvited Talk -- Getting a Few Things Right and Many Things Wrong -- Security of RSA and Multivariate Schemes -- Partial Key Exposure Attack on RSA - Improvements for Limited Lattice Dimensions -- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks -- CyclicRainbow - A Multivariate Signature Scheme with a Partially Cyclic Public Key -- Security Analysis, Pseudorandom Permutations and Applications -- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols -- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations -- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants -- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface -- Invited Talk -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function -- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing -- Speeding Up the Wide-Pipe: Secure and Fast Hashing -- Attacks on Block Ciphers and Stream Ciphers -- New Boomerang Attacks on ARIA -- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers -- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA -- Greedy Distinguishers and Nonrandomness Detectors -- Fast Cryptographic Computation -- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity -- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication -- Cryptanalysis of AES -- Attack on a Higher-Order Masking of the AES Based on Homographic Functions -- Improved Impossible Differential Cryptanalysis of 7-Round AES-128 -- Cryptanalysis ofa Perturbated White-Box AES Implementation -- Efficient Implementation -- A Program Generator for Intel AES-NI Instructions -- ECC2K-130 on NVIDIA GPUs -- One Byte per Clock: A Novel RC4 Hardware.
650 0 _aCryptography.
_91973
650 0 _aData encryption (Computer science).
_99168
650 0 _aComputer networks .
_931572
650 0 _aAlgorithms.
_93390
650 0 _aElectronic data processing
_xManagement.
_9152162
650 0 _aData protection.
_97245
650 0 _aComputer science
_xMathematics.
_93866
650 0 _aDiscrete mathematics.
_912873
650 1 4 _aCryptology.
_931769
650 2 4 _aComputer Communication Networks.
_9152163
650 2 4 _aAlgorithms.
_93390
650 2 4 _aIT Operations.
_931703
650 2 4 _aData and Information Security.
_931990
650 2 4 _aDiscrete Mathematics in Computer Science.
_931837
700 1 _aGong, Guang.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9152164
700 1 _aGupta, Kishan Chand.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_9152165
710 2 _aSpringerLink (Online service)
_9152166
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642174001
776 0 8 _iPrinted edition:
_z9783642174025
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v6498
_9152167
856 4 0 _uhttps://doi.org/10.1007/978-3-642-17401-8
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cELN
999 _c94555
_d94555