Selected Areas in Cryptography [electronic resource] : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers / edited by Lars R. Knudsen, Huapeng Wu.
Material type:
TextLanguage: English Series: Lecture Notes in Computer Science ; 7707Publication details: Berlin, Heidelberg : Springer Berlin Heidelberg, 2013.Description: 1 online resource (XIV, 407 p. 61 ill.)ISBN: - 9783642359996
| Item type | Current library | Call number | Materials specified | Status | Date due | Barcode | Item holds | |
|---|---|---|---|---|---|---|---|---|
|
|
National Library of India | Available | EBK000023740ENG |
Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao - Lai White-Box AES Implementation -- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model -- Forward Secure Signatures on Smart Cards -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the "Kindle" Cipher -- Cryptographically Strong de Bruijn Sequences with Large Periods -- Cryptanalysis of the Loiss Stream Cipher -- Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three -- Efficient Implementation of Bilinear Pairings on ARM Processors -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach -- Improved Cryptanalysis of the Block Cipher KASUMI -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers -- Attacking (EC)DSA Given Only an Implicit Hint -- Lattice Reduction for Modular Knapsack -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function -- Provable Security of BLAKE with Non-ideal Compression Function -- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.
There are no comments on this title.
