Image from Google Jackets

Research in Cryptology [electronic resource] : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised Selected Papers / edited by Frederik Armknecht, Stefan Lucks.

Contributor(s): Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science ; 7242Publication details: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.Description: 1 online resource (X, 151 p. 34 ill.)ISBN:
  • 9783642341595
Subject(s): Online resources:
Contents:
Broadcast Attacks against Code-Based Schemes -- On the Security of Hummingbird-2 against Side Channel Cube Attacks -- Full Lattice Basis Reduction on Graphics Cards -- Breaking DVB-CSA -- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks -- Γ-MAC[H, P] - A New Universal MAC Scheme -- New Universal Hash Functions -- Cryptanalysis of TWIS Block Cipher -- RSA Vulnerabilities with Small Prime Difference -- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k). On the Security of Hummingbird-2 against Side Channel Cube Attacks -- Full Lattice Basis Reduction on Graphics Cards -- Breaking DVB-CSA -- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks -- Γ-MAC[H, P] - A New Universal MAC Scheme -- New Universal Hash Functions -- Cryptanalysis of TWIS Block Cipher -- RSA Vulnerabilities with Small Prime Difference -- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k).
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode Item holds
Books Books National Library of India Available EBK000023923ENG
Total holds: 0

Broadcast Attacks against Code-Based Schemes -- On the Security of Hummingbird-2 against Side Channel Cube Attacks -- Full Lattice Basis Reduction on Graphics Cards -- Breaking DVB-CSA -- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks -- Γ-MAC[H, P] - A New Universal MAC Scheme -- New Universal Hash Functions -- Cryptanalysis of TWIS Block Cipher -- RSA Vulnerabilities with Small Prime Difference -- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k). On the Security of Hummingbird-2 against Side Channel Cube Attacks -- Full Lattice Basis Reduction on Graphics Cards -- Breaking DVB-CSA -- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks -- Γ-MAC[H, P] - A New Universal MAC Scheme -- New Universal Hash Functions -- Cryptanalysis of TWIS Block Cipher -- RSA Vulnerabilities with Small Prime Difference -- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k).

There are no comments on this title.

to post a comment.
                                                                           
web counter

Copyright ©2020 The National Library of India, Govt. of India ↔ Hosted by NVLI, MOC ↔ Technology and Design by National Library of India, Ministry of Culture, Govt. of India