Image from Google Jackets

Advances in Information and Computer Security [electronic resource] : 7th International Workshop on Security, IWSEC 2012, Fukuoka, Japan, November 7-9, 2012. Proceedings / edited by Goichiro Hanaoka, Toshihiro Yamauchi.

Contributor(s): Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science ; 7631Publication details: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.Description: 1 online resource (XII, 261 p. 33 ill.)ISBN:
  • 9783642341175
Subject(s): Online resources:
Contents:
Model-Based Conformance Testing for Android -- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography -- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU -- Very Short Critical Path Implementation of AES with Direct Logic Gates -- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary -- Compact Stateful Encryption Schemes with Ciphertext Verifiability -- Structured Encryption for Conceptual Graphs -- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability -- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI -- Boomerang Distinguishers for Full HAS-160 Compression Function -- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function -- Annihilators of Fast Discrete Fourier Spectra Attacks -- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher -- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security -- Efficient Secure Primitive for Privacy Preserving Distributed Computations -- Generic Construction of GUC Secure Commitment in the KRK Model.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode Item holds
Books Books National Library of India Available EBK000023928ENG
Total holds: 0

Model-Based Conformance Testing for Android -- Application of Scalar Multiplication of Edwards Curves to Pairing-Based Cryptography -- Standardized Signature Algorithms on Ultra-constrained 4-Bit MCU -- Very Short Critical Path Implementation of AES with Direct Logic Gates -- One-Round Authenticated Key Exchange with Strong Forward Secrecy in the Standard Model against Constrained Adversary -- Compact Stateful Encryption Schemes with Ciphertext Verifiability -- Structured Encryption for Conceptual Graphs -- Symmetric-Key Encryption Scheme with Multi-ciphertext Non-malleability -- Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI -- Boomerang Distinguishers for Full HAS-160 Compression Function -- Polynomial-Advantage Cryptanalysis of 3D Cipher and 3D-Based Hash Function -- Annihilators of Fast Discrete Fourier Spectra Attacks -- Meet-in-the-Middle Attack on Reduced Versions of the Camellia Block Cipher -- Efficient Concurrent Oblivious Transfer in Super-Polynomial-Simulation Security -- Efficient Secure Primitive for Privacy Preserving Distributed Computations -- Generic Construction of GUC Secure Commitment in the KRK Model.

There are no comments on this title.

to post a comment.
                                                                           
web counter

Copyright ©2020 The National Library of India, Govt. of India ↔ Hosted by NVLI, MOC ↔ Technology and Design by National Library of India, Ministry of Culture, Govt. of India