000 | 04822nam a22006855i 4500 | ||
---|---|---|---|
001 | 978-3-540-32278-8 | ||
003 | DE-He213 | ||
005 | 20240423125559.0 | ||
007 | cr nn 008mamaa | ||
008 | 100410s2005 gw | s |||| 0|eng d | ||
020 |
_a9783540322788 _9978-3-540-32278-8 |
||
024 | 7 |
_a10.1007/11596219 _2doi |
|
050 | 4 | _aQA268 | |
072 | 7 |
_aGPJ _2bicssc |
|
072 | 7 |
_aURY _2bicssc |
|
072 | 7 |
_aCOM083000 _2bisacsh |
|
072 | 7 |
_aGPJ _2thema |
|
072 | 7 |
_aURY _2thema |
|
082 | 0 | 4 |
_a005.824 _223 |
245 | 1 | 0 |
_aProgress in Cryptology - INDOCRYPT 2005 _h[electronic resource] : _b6th International Conference on Cryptology in India, Bangalore, India, December 10-12, 2005, Proceedings / _cedited by Subhamoy Maitra, C.E. Veni Madhavan, Ramarathnam Venkatesan. |
250 | _a1st ed. 2005. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2005. |
|
300 |
_aXIV, 420 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology, _x2946-1863 ; _v3797 |
|
505 | 0 | _aInvited Talk -- Abelian Varieties and Cryptography -- Sequences -- Proof of a Conjecture on the Joint Linear Complexity Profile of Multisequences -- Period of Streamcipher Edon80 -- Boolean Function and S-Box -- On the Algebraic Immunity of Symmetric Boolean Functions -- On Highly Nonlinear S-Boxes and Their Inability to Thwart DPA Attacks -- Hash Functions -- How to Construct Universal One-Way Hash Functions of Order r -- Towards Optimal Double-Length Hash Functions -- Design Principles -- Near Optimal Algorithms for Solving Differential Equations of Addition with Batch Queries -- Design Principles for Combiners with Memory -- Cryptanalysis I -- Cryptanalysis of the Quadratic Generator -- Attack the Dragon -- Two Algebraic Attacks Against the F-FCSRs Using the IV Mode -- Cryptanalysis of Keystream Generator by Decimated Sample Based Algebraic and Fast Correlation Attacks -- Time Memory Trade-Off -- TMD-Tradeoff and State Entropy Loss Considerations of Streamcipher MICKEY -- Time-Memory Trade-Offs: False Alarm Detection Using Checkpoints -- Cryptanalysis II -- Cryptanalysis of Barni et al. Watermarking Scheme -- Completion Attacks and Weak Keys of Oleshchuk’s Public Key Cryptosystem -- New Constructions -- An Optimal Subset Cover for Broadcast Encryption -- MaTRU: A New NTRU-Based Cryptosystem -- Anonymous Password-Based Authenticated Key Exchange -- Pairings -- Faster Pairings Using an Elliptic Curve with an Efficient Endomorphism -- Reconsideration on the Security of the Boneh-Franklin Identity-Based Encryption Scheme -- Signatures -- Short Undeniable Signatures Without Random Oracles: The Missing Link -- Short Threshold Signature Schemes Without Random Oracles -- Applications -- Attacking an Asynchronous Multi-party Contract Signing Protocol -- Fairness and Correctness in Case of a Premature Abort.-E-Cash -- Short E-Cash -- A Universally Composable Scheme for Electronic Cash -- Implementations -- Energy-Privacy Trade-Offs in VLSI Computations -- Modified Serial Multipliers for Type-IV Gaussian Normal Bases -- Scalar Multiplication on Elliptic Curves Defined over Fields of Small Odd Characteristic -- SCA Resistant Parallel Explicit Formula for Addition and Doubling of Divisors in the Jacobian of Hyperelliptic Curves of Genus 2. | |
650 | 0 | _aCryptography. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aCoding theory. | |
650 | 0 | _aInformation theory. | |
650 | 0 | _aAlgorithms. | |
650 | 0 |
_aComputer science _xMathematics. |
|
650 | 0 | _aDiscrete mathematics. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputer networks . | |
650 | 1 | 4 | _aCryptology. |
650 | 2 | 4 | _aCoding and Information Theory. |
650 | 2 | 4 | _aAlgorithms. |
650 | 2 | 4 | _aDiscrete Mathematics in Computer Science. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aComputer Communication Networks. |
700 | 1 |
_aMaitra, Subhamoy. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aMadhavan, C.E. Veni. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aVenkatesan, Ramarathnam. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540308058 |
776 | 0 | 8 |
_iPrinted edition: _z9783540818632 |
830 | 0 |
_aSecurity and Cryptology, _x2946-1863 ; _v3797 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/11596219 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cSPRINGER | ||
999 |
_c179524 _d179524 |