Progress in cryptology -- AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /
Saved in:

Progress in cryptology -- AFRICACRYPT 2012 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /

Bibliographic Details
Corporate Authors: International Conference on Cryptology in Africa Ifrane (Meknès), Morocco), SpringerLink (Online service)
Other Authors: Mitrokotsa, Aikaterini, Vaudenay, Serge
Format: Online Conference Proceeding Book
Language:English
Published: Berlin ; New York : Springer, c2012.
Series:Lecture notes in computer science ; 7374.
LNCS sublibrary. Security and cryptology.
Subjects:
Access:Online version
Tags: Add Tag
No Tags, Be the first to tag this record!

MARC

LEADER 00000cam a2200000Ia 4500
001 1408722
005 20120917145448.0
006 m d
007 cr cnu---unuuu
008 120629s2012 gw a ob 101 0 eng d
035 |a (OCoLC)ocn797175647 
040 |a GW5XE  |c GW5XE  |d ZMC  |d C$Q  |d UKMGB  |d COO 
016 7 |a 016134785  |2 Uk 
020 |a 9783642314100 (electronic bk.) 
020 |a 3642314104 (electronic bk.) 
020 |z 9783642314094 
050 4 |a QA76.9.A25  |b .I58 2012 
049 |a PVUM 
111 2 |a International Conference on Cryptology in Africa  |n (5th :  |d 2012 :  |c Ifrane (Meknès), Morocco) 
245 1 0 |a Progress in cryptology -- AFRICACRYPT 2012  |h [electronic resource] :  |b 5th International Conference on Cryptology in Africa, Ifrane, Morocco, July 10-12, 2012. Proceedings /  |c Aikaterini Mitrokotsa, Serge Vaudenay (eds.). 
246 3 |a AFRICACRYPT 2012 
260 |a Berlin ;  |a New York :  |b Springer,  |c c2012. 
300 |a 1 online resource (xi, 424 p.) :  |b ill. 
490 1 |a Lecture notes in computer science,  |x 1611-3349 ;  |v 7374 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology 
505 0 0 |t Batch Verification of ECDSA Signatures /  |r Sabyasachi Karati, Abhijit Das, Dipanwita Roychowdhury, Bhargav Bellur and Debojyoti Bhattacharya, et al. --  |t Extended Security Arguments for Signature Schemes /  |r Sidi Mohamed El Yousfi Alaoui, Özgür Dagdelen, Pascal Véron, David Galindo and Pierre-Louis Cayrel --  |t Sanitizable Signatures with Several Signers and Sanitizers /  |r Sébastien Canard, Amandine Jambert and Roch Lescuyer --  |t Attack Based on Direct Sum Decomposition against the Nonlinear Filter Generator /  |r Jingjing Wang, Xiangxue Li, Kefei Chen and Wenzheng Zhang --  |t Fuzzy Vault for Multiple Users /  |r Julien Bringer, Hervé Chabanne and Mélanie Favre --  |t Bounds and Constructions for 1-Round (0,[delta])-Secure Message Transmission against Generalized Adversary /  |r Reihaneh Safavi-Naini and Mohammed Ashraful Alam Tuhin --  |t Improving the Performance of the SYND Stream Cipher /  |r Mohammed Meziani, Gerhard Hoffmann and Pierre-Louis Cayrel --  |t Impossible Differential Cryptanalysis of the Lightweight Block Ciphers TEA, XTEA and HIGHT /  |r Jiazhe Chen, Meiqin Wang and Bart Preneel --  |t Three-Subset Meet-in-the-Middle Attack on Reduced XTEA /  |r Yu Sasaki, Lei Wang, Yasuhide Sakai, Kazuo Sakiyama and Kazuo Ohta --  |t Differential Cryptanalysis of Reduced-Round ICEBERG /  |r Yue Sun, Meiqin Wang, Shujia Jiang and Qiumei Sun --  |t Compact Implementation and Performance Evaluation of Block Ciphers in ATtiny Devices /  |r Thomas Eisenbarth, Zheng Gong, Tim Güneysu, Stefan Heyse and Sebastiaan Indesteege, et al. --  |t Cryptanalysis of Enhanced TTS, STS and All Its Variants, or: Why Cross-Terms Are Important /  |r Enrico Thomae and Christopher Wolf --  |t A Complementary Analysis of the (s)YZ and DIKE Protocols /  |r Augustin P. Sarr and Philippe Elbaz-Vincent --  |t A New Attack on RSA and CRT-RSA /  |r Abderrahmane Nitaj --  |t Shift-Type Homomorphic Encryption and Its Application to Fully Homomorphic Encryption /  |r Frederik Armknecht, Stefan Katzenbeisser and Andreas Peter --  |t The Collision Security of MDC-4 /  |r Ewan Fleischmann, Christian Forler and Stefan Lucks --  |t SPN-Hash: Improving the Provable Resistance against Differential Collision Attacks /  |r Jiali Choy, Huihui Yap, Khoongming Khoo, Jian Guo and Thomas Peyrin, et al. --  |t Security Analysis and Comparison of the SHA-3 Finalists BLAKE, Grøstl, JH, Keccak, and Skein /  |r Elena Andreeva, Bart Mennink, Bart Preneel and Marjan Škrobot --  |t The GLUON Family: A Lightweight Hash Function Family Based on FCSRs /  |r Thierry P. Berger, Joffrey D'Hayer, Kevin Marquet, Marine Minier and Gaël Thomas --  |t SHA-3 on ARM11 Processors /  |r Peter Schwabe, Bo-Yin Yang and Shang-Yi Yang --  |t Improved Fixed-Base Comb Method for Fast Scalar Multiplication /  |r Nashwa A. F. Mohamed, Mohsin H. A. Hashim and Michael Hutter --  |t Optimal First-Order Masking with Linear and Non-linear Bijections /  |r Houssem Maghrebi, Claude Carlet, Sylvain Guilley and Jean-Luc Danger --  |t Size-Hiding in Private Set Intersection: Existential Results and Constructions /  |r Paolo D'Arco, María Isabel González Vasco, Angel L. Pérez del Pozo and Claudio Soriente --  |t Round-Optimal Black-Box Statistically Binding Selective-Opening Secure Commitments /  |r David Xiao --  |t Stream Ciphers, a Perspective /  |r Willi Meier --  |t Black-Box Reductions and Separations in Cryptography /  |r Marc Fischlin. 
500 |a International conference proceedings. 
504 |a Includes bibliographical references and author index. 
506 |a Electronic access restricted to Villanova University patrons. 
588 |a Description based on online resource; title from PDF t.p. (SpringerLink, viewed Aug. 13, 2012). 
598 |a 17-SEP-12 
650 0 |a Data encryption (Computer science)  |v Congresses. 
650 0 |a Computer networks  |x Access control  |v Congresses. 
650 0 |a Data protection  |v Congresses. 
700 1 |a Mitrokotsa, Aikaterini. 
700 1 |a Vaudenay, Serge. 
710 2 |a SpringerLink (Online service) 
830 0 |a Lecture notes in computer science ;  |v 7374. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |z Online version  |u http://ezproxy.villanova.edu/login?URL=http://dx.doi.org/10.1007/978-3-642-31410-0  |t 0 
994 |a 92  |b PVU 
999 f f |i 122d34f2-477f-5636-b05c-8cc45f0408d6  |s 2a32ca09-847b-5cf5-9c35-d0903467c863  |t 0 
952 f f |p Default  |a Villanova University  |b Villanova PA  |c Falvey Memorial Library  |d World Wide Web  |t 0  |e QA76.9.A25 .I58 2012  |h Library of Congress classification  |i Electronic Books  |n 1