000 05081nam a22006375i 4500
001 978-3-642-32928-9
003 DE-He213
005 20240423125706.0
007 cr nn 008mamaa
008 120830s2012 gw | s |||| 0|eng d
020 _a9783642329289
_9978-3-642-32928-9
024 7 _a10.1007/978-3-642-32928-9
_2doi
050 4 _aQA268
072 7 _aGPJ
_2bicssc
072 7 _aURY
_2bicssc
072 7 _aCOM083000
_2bisacsh
072 7 _aGPJ
_2thema
072 7 _aURY
_2thema
082 0 4 _a005.824
_223
245 1 0 _aSecurity and Cryptography for Networks
_h[electronic resource] :
_b8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings /
_cedited by Ivan Visconti, Roberto De Prisco.
250 _a1st ed. 2012.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2012.
300 _aXI, 582 p. 75 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSecurity and Cryptology,
_x2946-1863 ;
_v7485
505 0 _aDeterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance andPre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
520 _aThis book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
650 0 _aCryptography.
650 0 _aData encryption (Computer science).
650 0 _aData protection.
650 0 _aComputer networks .
650 0 _aElectronic data processing
_xManagement.
650 0 _aInformation technology
_xManagement.
650 1 4 _aCryptology.
650 2 4 _aData and Information Security.
650 2 4 _aComputer Communication Networks.
650 2 4 _aIT Operations.
650 2 4 _aComputer Application in Administrative Data Processing.
700 1 _aVisconti, Ivan.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
700 1 _aDe Prisco, Roberto.
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783642329272
776 0 8 _iPrinted edition:
_z9783642329296
830 0 _aSecurity and Cryptology,
_x2946-1863 ;
_v7485
856 4 0 _uhttps://doi.org/10.1007/978-3-642-32928-9
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
942 _cSPRINGER
999 _c180702
_d180702