Image from Google Jackets

Progress in Cryptology - INDOCRYPT 2012 [electronic resource] : 13th International Conference on Cryptology in India, Kolkata, India, December 9-12, 2012. Proceedings / edited by Steven Galbraith, Mridul Nandi.

Contributor(s): Material type: TextTextLanguage: English Series: Lecture Notes in Computer Science ; 7668Publication details: Berlin, Heidelberg : Springer Berlin Heidelberg, 2012.Description: 1 online resource (XIV, 566 p. 118 ill.)ISBN:
  • 9783642349317
Subject(s): Online resources:
Contents:
How to Compute on Encrypted Data -- Using the Cloud to Determine Key Strengths -- On the Non-malleability of the Fiat-Shamir Transform -- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 -- Leakage Squeezing of Order Two -- Hash Functions and Stream Cipher -- Collision Attack on the Hamsi-256 Compression Function -- Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks -- A Di_erential Fault Attack on the Grain Family under Reasonable Assumptions -- Faster Chosen-Key Distinguishers on Reduced-Round AES -- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System -- Computing Small Discrete Logarithms Faster -- Embedded Syndrome-Based Hashing -- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA -- A New Model of Binary Elliptic Curves -- Symmetric Key Design and Provable Security SipHash: a fast short-input PRF.
Tags from this library: No tags from this library for this title. Log in to add tags.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Materials specified Status Date due Barcode Item holds
Books Books National Library of India Available EBK000023873ENG
Total holds: 0

How to Compute on Encrypted Data -- Using the Cloud to Determine Key Strengths -- On the Non-malleability of the Fiat-Shamir Transform -- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84 -- Leakage Squeezing of Order Two -- Hash Functions and Stream Cipher -- Collision Attack on the Hamsi-256 Compression Function -- Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks -- A Di_erential Fault Attack on the Grain Family under Reasonable Assumptions -- Faster Chosen-Key Distinguishers on Reduced-Round AES -- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System -- Computing Small Discrete Logarithms Faster -- Embedded Syndrome-Based Hashing -- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA -- A New Model of Binary Elliptic Curves -- Symmetric Key Design and Provable Security SipHash: a fast short-input PRF.

There are no comments on this title.

to post a comment.
                                                                           
web counter

Copyright ©2020 The National Library of India, Govt. of India ↔ Hosted by NVLI, MOC ↔ Technology and Design by National Library of India, Ministry of Culture, Govt. of India