Staff View for: Information security and cryptology : 8t

 Staff view

You must be logged in to Tag Records

Information security and cryptology : 8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012 : revised selected papers /

Mirosław Kutyłowski, Moti Yung (eds.).

Book Cover
Names: Kutyłowski, Mirosław. | Yung, Moti.
Published: Berlin ; Springer, ©2013.
Series: Lecture notes in computer science ; 7763.
LNCS sublibrary. SL 4, Security and cryptology.
Topics: Computer security - Congresses. | Data encryption (Computer science) - Congresses. | Computer Security.
Genres: Electronic books. | Congress. | Conference papers and proceedings.
Tags: Add

Spaces will separate tags.
Use quotes for multi-word tags.

000 05970cam a2200613Ia 4500
001 13558323
005 20190928191950.0
006 m o d
007 cr cn|||||||||
008 130509s2013 gw a ob 101 0 eng d
016 7 |a016424962|2Uk
020 |a9783642385193|q(electronic bk.)
020 |a3642385192|q(electronic bk.)
020 |z9783642385186
024 7 |a10.1007/978-3-642-38519-3|2doi
035 |a(OCoLC)ocn842218043
035 |a(UIUdb)9132329
049 |aUIUU|oskip
050 4|aQA76.9.A25|bI57 2012
060 4|aQA 76.9.A25
082 04|a005.8|223
111 2 |aInscrypt (Conference)|n(8th :|d2012 :|cBeijing, China)
245 10|aInformation security and cryptology :|b8th International Conference, Inscrypt 2012, Beijing, China, November 28-30, 2012 : revised selected papers /|cMirosław Kutyłowski, Moti Yung (eds.).
246 3 |aINSCRYPT 2012
260 |aBerlin ;|aNew York :|bSpringer,|c©2013.
300 |a1 online resource (xii, 391 pages) :|billustrations
336 |atext|btxt|2rdacontent
337 |acomputer|bc|2rdamedia
338 |aonline resource|bcr|2rdacarrier
490 1 |aLecture notes in computer science,|x1611-3349 ;|v7763
490 1 |aLNCS sublibrary. SL 4, Security and cryptology
504 |aIncludes bibliographical references and author index.
505 00|tOn the Multiple Fault Attacks on RSA Signatures with LSBs of Messages Unknown /|rLidong Han, Wei Wei, Mingjie Liu --|tDifferential Fault Analysis of Twofish /|rSk Subidh Ali, Debdeep Mukhopadhyay --|tImproved Differential Cache Attacks on SMS4 /|rPhuong Ha Nguyen, Chester Rebeiro --|tAn Extension of Fault Sensitivity Analysis Based on Clockwise Collision /|rYang Li, Kazuo Ohta, Kazuo Sakiyama --|tA Robust Fuzzy Extractor without ECCs /|rJintao Yao, Kangshun Li, Mingwu Zhang, Min Zhou --|tAn Efficient Rational Secret Sharing Protocol Resisting against Malicious Adversaries over Synchronous Channels /|rYang Yu, Zhanfei Zhou --|tVisual Cryptography for Natural Images and Visual Voting /|rTeng Guo, Feng Liu, ChuanKun Wu --|tRCCA Security for KEM+DEM Style Hybrid Encryptions /|rYuan Chen, Qingkuan Dong --|tEmbedded Surface Attack on Multivariate Public Key Cryptosystems from Diophantine Equations /|rJintai Ding, Ai Ren, Chengdong Tao --|tVerifiable Structured Encryption /|rMoesfa Soeheila Mohamad, Geong Sen Poh --|tNested Merkle's Puzzles against Sampling Attacks /|rShlomi Dolev, Nova Fandina, Ximing Li --|tOptimizing Guessing Strategies for Algebraic Cryptanalysis with Applications to EPCBC /|rMichael Walter, Stanislav Bulygin, Johannes Buchmann --|tA General Model for MAC Generation Using Direct Injection /|rHarry Bartlett, Mufeed AlMashrafi, Leonie Simpson --|tCollision Attacks on Variant of OCB Mode and Its Series /|rZhelei Sun, Peng Wang, Liting Zhang --|tThe Security and Performance of "GCM" when Short Multiplications Are Used Instead /|rKazumaro Aoki, Kan Yasuda --|tEstimating Resistance against Multidimensional Linear Attacks: An Application on DEAN /|rRisto M. Hakala, Atle Kivelä, Kaisa Nyberg --|tFast Evaluation of T-Functions via Time-Memory Trade-Offs /|rTao Shi, Vladimir Anashin, Dongdai Lin --|tConstruction of Resilient and Nonlinear Boolean Functions with Almost Perfect Immunity to Algebraic and Fast Algebraic Attacks /|rTianze Wang, Meicheng Liu, Dongdai Lin --|tAn Improved Time-Memory-Data Trade-Off Attack against Irregularly Clocked and Filtered Keystream Generators /|rLin Jiao, Mingsheng Wang, Bin Zhang, Yongqiang Li --|tNew Sequences of Period p n and p n + 1via Projective Linear Groups /|rLin Wang, Zhi Hu --|tTouch Gestures Based Biometric Authentication Scheme for Touchscreen Mobile Phones /|rYuxin Meng, Duncan S. Wong, Roman Schlegel --|tSecure Product Tracking in Supply Chain /|rMehdi Khalfaoui, Refik Molva, Laurent Gomez --|tThe Bussard-Bagga and Other Distance-Bounding Protocols under Attacks /|rAslı Bay, Ioana Boureanu, Aikaterini Mitrokotsa.
520 |aThis book constitutes the thoroughly refereed post-conference proceedings of the 8th International Conference on Information Security and Cryptology, Inscrypt 2012, held in Beijing, China, in November 2012. The 23 revised full papers presented were carefully reviewed and selected from 71 submissions. The papers cover the topics of side channel attacks, extractor and secret sharing, public key cryptography, block ciphers, stream ciphers, new constructions and protocols.
588 0 |aOnline resource; title from PDF title page (SpringerLink, viewed May 23, 2013).
650 0|aComputer security|vCongresses.
650 0|aData encryption (Computer science)|vCongresses.
650 2|aComputer Security.|0(DNLM)D016494
650 7|aComputer security.|2fast|0(OCoLC)fst00872484
650 7|aData encryption (Computer science)|2fast|0(OCoLC)fst00887935
655 4|aElectronic books.
655 2|aCongress.|0(DNLM)D016423
655 7|aConference papers and proceedings.|2fast|0(OCoLC)fst01423772
700 1 |aKutyłowski, Mirosław.
700 1 |aYung, Moti.
776 08|iPrint version:|tInformation security and cryptology.|d[S.l.] : Springer-Verlag Berlin An, 2013|z3642385184|w(DLC) 2013938367|w(OCoLC)841520772
830 0|aLecture notes in computer science ;|v7763.|x1611-3349
830 0|aLNCS sublibrary.|nSL 4,|pSecurity and cryptology.
852 8 |beresour-nc|hOnline Resource|t1|zAccessible anywhere on campus or with UIUC NetID
856 40|3SpringerLink - Full text online|u
938 |aEBL - Ebook Library|bEBLB|nEBL3093432
938 |aYBP Library Services|bYANK|n10755783
994 |aC0|bUIU

Staff View for: Information security and cryptology : 8t