Progress in cryptology -- AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /
Corporate Authors: | , |
---|---|
Other Authors: | , |
Format: | Online Conference Proceeding Book |
Language: | English |
Published: |
Berlin ; New York :
Springer,
c2012.
|
Series: | Lecture notes in computer science ;
7374. LNCS sublibrary. Security and cryptology. |
Subjects: | |
Access: | Online version |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
LEADER | 00000cam a2200000Ia 4500 | ||
---|---|---|---|
001 | 1408722 | ||
005 | 20120917145448.0 | ||
006 | m d | ||
007 | cr cnu---unuuu | ||
008 | 120629s2012 gw a ob 101 0 eng d | ||
035 | |a (OCoLC)ocn797175647 | ||
040 | |a GW5XE |c GW5XE |d ZMC |d C$Q |d UKMGB |d COO | ||
016 | 7 | |a 016134785 |2 Uk | |
020 | |a 9783642314100 (electronic bk.) | ||
020 | |a 3642314104 (electronic bk.) | ||
020 | |z 9783642314094 | ||
050 | 4 | |a QA76.9.A25 |b .I58 2012 | |
049 | |a PVUM | ||
111 | 2 | |a International Conference on Cryptology in Africa |n (5th : |d 2012 : |c Ifrane (Meknès), Morocco) | |
245 | 1 | 0 | |a Progress in cryptology -- AFRICACRYPT 2012 |h [electronic resource] : |b 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings / |c Aikaterini Mitrokotsa, Serge Vaudenay (eds.). |
246 | 3 | |a AFRICACRYPT 2012 | |
260 | |a Berlin ; |a New York : |b Springer, |c c2012. | ||
300 | |a 1 online resource (xi, 424 p.) : |b ill. | ||
490 | 1 | |a Lecture notes in computer science, |x 1611-3349 ; |v 7374 | |
490 | 1 | |a LNCS sublibrary. SL 4, Security and cryptology | |
505 | 0 | 0 | |t Batch Verification of ECDSA Signatures / |r Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur and Debojyoti Bhattacharya, et al. -- |t Extended Security Arguments for Signature Schemes / |r Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo and Pierre-Louis Cayrel -- |t Sanitizable Signatures with Several Signers and Sanitizers / |r Sébastien Canard, Amandine Jambert and Roch Lescuyer -- |t Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator / |r Jingjing Wang, Xiangxue Li, Kefei Chen and Wenzheng Zhang -- |t Fuzzy Vault for Multiple Users / |r Julien Bringer, Hervé Chabanne and Mélanie Favre -- |t Bounds and Constructions for 1-Round (0,[delta])-Secure Message Transmission against Generalized Adversary / |r Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin -- |t Improving the Performance of the SYND Stream Cipher / |r Mohammed Meziani, Gerhard Hoffmann and Pierre-Louis Cayrel -- |t Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT / |r Jiazhe Chen, Meiqin Wang and Bart Preneel -- |t Three-Subset Meet-in-the-Middle Attack on Reduced XTEA / |r Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama and Kazuo Ohta -- |t Differential Cryptanalysis of Reduced-Round ICEBERG / |r Yue Sun, Meiqin Wang, Shujia Jiang and Qiumei Sun -- |t Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices / |r Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse and Sebastiaan Indesteege, et al. -- |t Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important / |r Enrico Thomae and Christopher Wolf -- |t A Complementary Analysis of the (s)YZ and DIKE Protocols / |r Augustin P. Sarr and Philippe Elbaz-Vincent -- |t A New Attack on RSA and CRT-RSA / |r Abderrahmane Nitaj -- |t Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption / |r Frederik Armknecht, Stefan Katzenbeisser and Andreas Peter -- |t The Collision Security of MDC-4 / |r Ewan Fleischmann, Christian Forler and Stefan Lucks -- |t SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks / |r Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo and Thomas Peyrin, et al. -- |t Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein / |r Elena Andreeva, Bart Mennink, Bart Preneel and Marjan Škrobot -- |t The GLUON Family: A Lightweight Hash Function Family Based on FCSRs / |r Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier and Gaël Thomas -- |t SHA-3 on ARM11 Processors / |r Peter Schwabe, Bo-Yin Yang and Shang-Yi Yang -- |t Improved Fixed-Base Comb Method for Fast Scalar Multiplication / |r Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter -- |t Optimal First-Order Masking with Linear and Non-linear Bijections / |r Houssem Maghrebi, Claude Carlet, Sylvain Guilley and Jean-Luc Danger -- |t Size-Hiding in Private Set Intersection: Existential Results and Constructions / |r Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo and Claudio Soriente -- |t Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments / |r David Xiao -- |t Stream Ciphers, a Perspective / |r Willi Meier -- |t Black-Box Reductions and Separations in Cryptography / |r Marc Fischlin. |
500 | |a International conference proceedings. | ||
504 | |a Includes bibliographical references and author index. | ||
506 | |a Electronic access restricted to Villanova University patrons. | ||
588 | |a Description based on online resource; title from PDF t.p. (SpringerLink, viewed Aug. 13, 2012). | ||
598 | |a 17-SEP-12 | ||
650 | 0 | |a Data encryption (Computer science) |v Congresses. | |
650 | 0 | |a Computer networks |x Access control |v Congresses. | |
650 | 0 | |a Data protection |v Congresses. | |
700 | 1 | |a Mitrokotsa, Aikaterini. | |
700 | 1 | |a Vaudenay, Serge. | |
710 | 2 | |a SpringerLink (Online service) | |
830 | 0 | |a Lecture notes in computer science ; |v 7374. | |
830 | 0 | |a LNCS sublibrary. |n SL 4, |p Security and cryptology. | |
856 | 4 | 0 | |z Online version |u http://ezproxy.villanova.edu/login?URL=http://dx.doi.org/10.1007/978-3-642-31410-0 |t 0 |
994 | |a 92 |b PVU | ||
999 | f | f | |i 122d34f2-477f-5636-b05c-8cc45f0408d6 |s 2a32ca09-847b-5cf5-9c35-d0903467c863 |t 0 |
952 | f | f | |p Default |a Villanova University |b Villanova PA |c Falvey Memorial Library |d World Wide Web |t 0 |e QA76.9.A25 .I58 2012 |h Library of Congress classification |i Electronic Books |n 1 |