Cryptography and Information Security in the Balkans First International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers / [electronic resource] : edited by Berna Ors, Bart Preneel. - Cham : Springer International Publishing, 2015. - 1 online resource (X, 251 p. 43 ill.) - Lecture Notes in Computer Science, 9024 0302-9743 ; .

Authentication in Constrained Settings -- Optimizing the Placement of Tap Positions -- Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure -- Algebraic Attacks Using Binary Decision Diagrams -- Universally Composable Firewall Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms -- A Secure and Efficient Protocol for Electronic Treasury Auctions -- Anonymous Data Collection System with Mediators -- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations -- Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps -- On the Anonymization of Cocks IBE Scheme -- Nearest Planes in Practice -- Timed-Release Secret Sharing Schemes with Information Theoretic Security -- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties.

9783319213569


Computer science.
Computer security.
Data encryption (Computer science).