Staff View for: Advances in cryptology -- EUROCRYPT 2009

 Staff view

You must be logged in to Tag Records

Advances in cryptology -- EUROCRYPT 2009 [electronic resource] : 28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 : proceedings /

Antoine Joux (ed.).

Book Cover
Names: Joux, Antoine
Published: Berlin ; Springer, 2009.
Series: LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 5479.
Topics: Computers - Access control - Congresses. | Cryptography - Congresses. | Data transmission systems - Security measures - Congresses.
Tags: Add


Spaces will separate tags.
Use quotes for multi-word tags.


000 04150cam a2200421Ka 4500
001 11123679
005 20140621205454.0
006 m d
007 cr cn|
008 090421s2009 gw a sb 101 0 eng d
020 |a9783642010019
020 |a3642010016
035 |a(OCoLC)ocn318933918
035 |a(IITdb)806114
037 |a978-3-642-01001-9|bSpringer|nhttp://www.springerlink.com
040 |aCUS|cCUS|dC$Q|dIITdb
049 |aILLA
050 4|aQA76.9.A25|bE965 2009
111 2 |aEUROCRYPT|n(28th :|d2009 :|cCologne, Germany)
245 10|aAdvances in cryptology -- EUROCRYPT 2009|h[electronic resource] :|b28th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Cologne, Germany, April 26-30, 2009 : proceedings /|cAntoine Joux (ed.).
246 30|aEUROCRYPT 2009
260 |aBerlin ;|aNew York :|bSpringer,|c2009.
300 |axv, 611 p. :|bdigital, PDF file
440 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology
490 1 |aLecture notes in computer science,|x0302-9743 ;|v5479
500 |aTitle from PDF t.p. (SpringerLink, viewed Apr. 21, 2009).
504 |aIncludes bibliographical references and index.
505 0 |aPossibility and impossibility results for encryption and commitment secure under selective opening -- Breaking RSA generically is equivalent to factoring -- Resettably secure computation -- On the security loss in cryptographic reductions -- On randomizing hash functions to strengthen the security of digital signatures -- Cryptanalysis of MDC-2 -- Cryptanalysis on HMAC/NMAC-MD5 and MD5-MAC -- Finding preimages in full MD5 faster than exhaustive search -- Asymmetric group key agreement -- Adaptive security in broadcast encryption systems (with short ciphertexts) -- Traitors collaborating in public : Pirates 2.0 -- Key agreement from close secrets over unsecured channels -- Order-preserving symmetric encryption -- A double-piped mode of operation for MACs, PRFs and PROs : Security beyond the birthday barrier -- On the security of cryptosystems with quadratic decryption : The nicest cryptanalysis -- Cube attacks on tweakable black box polynomials -- Smashing SQUASH-0 -- Practical chosen ciphertext secure encryption from factoring -- Realizing hash-and-sign signatures under standard assumptions -- A public key encryption scheme secure against key dependent chosen plaintext and adaptive chosen ciphertext attacks -- Cryptography without (hardly any) secrets ? -- Salvaging Merkle-Damgård for practical applications -- On the security of padding-based encryption schemes - or - why we cannot prove OAEP secure in the standard model -- Simulation without the artificial abort : Simplified proof and improved concrete security for Waters' IBE scheme -- On the portability of generalized Schnorr proofs -- A unified framework for the analysis of side-channel key recovery attacks -- A leakage-resilient mode of operation -- ECM on graphics cards -- Double-base number system for multi-scalar multiplications -- Endomorphisms for faster elliptic curve cryptography on a large class of curves -- Generating genus two hyperelliptic curves over large characteristic finite fields -- Verifiable random functions from identity-based key encapsulation -- Optimal randomness extraction from a Diffie-Hellman element -- A new randomness extraction paradigm for hybrid encryption.
538 |aMode of access: World Wide Web.
650 0|aComputers|xAccess control|vCongresses.
650 0|aCryptography|vCongresses.
650 0|aData transmission systems|xSecurity measures|vCongresses.
700 1 |aJoux, Antoine
776 08|iPrint version:|aEUROCRYPT (28th : 2009 : Cologne, Germany) ).|tAdvances in cryptology -- EUROCRYPT 2009.|dBerlin ; New York : Springer, 2009|z9783642010002
830 0|aLecture notes in computer science ;|v5479.
852 0 |bGER|hQA76.9.A25|iE965 2009eb
856 40|3SpringerLink|uhttps://ezproxy.gl.iit.edu/login?url=http://dx.doi.org/10.1007/978-3-642-01001-9|zAccess to the electronic version for current IIT main & branch campus students, faculty, & staff.
994 |a92|bILL

Staff View for: Advances in cryptology -- EUROCRYPT 2009