Progress in Cryptology - INDOCRYPT 2012
Up to date resultsFast conference proceedingsUnique visiblility
How to Compute on Encrypted Data.- Using the Cloud to Determine Key Strengths.- On the Non-malleability of the Fiat-Shamir Transform.- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84.- Leakage Squeezing of Order Two.- Hash Functions and Stream Cipher.- Collision Attack on the Hamsi-256 Compression Function.- Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks.- A Di_erential Fault Attack on the Grain Family under Reasonable Assumptions.- Faster Chosen-Key Distinguishers on Reduced-Round AES.- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System.- Computing Small Discrete Logarithms Faster.- Embedded Syndrome-Based Hashing.- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA.- A New Model of Binary Elliptic Curves.- Symmetric Key Design and Provable Security SipHash: a fast short-input PRF.
| Erscheint lt. Verlag | 29.10.2012 |
|---|---|
| Reihe/Serie | Lecture Notes in Computer Science | Security and Cryptology |
| Zusatzinfo | XIV, 566 p. 118 illus. |
| Verlagsort | Berlin |
| Sprache | englisch |
| Maße | 155 x 235 mm |
| Gewicht | 866 g |
| Themenwelt | Informatik ► Theorie / Studium ► Kryptologie |
| Schlagworte | Algorithm analysis and problem complexity |
| ISBN-13 | 9783642349300 / 9783642349300 |
| Zustand | Neuware |
| Informationen gemäß Produktsicherheitsverordnung (GPSR) | |
| Haben Sie eine Frage zum Produkt? |
aus dem Bereich