• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Selected Areas in Cryptography :

پدید آورنده
edited by Lars R. Knudsen, Huapeng Wu.

موضوع
Computer Communication Networks.,Computer science.,Data protection.

رده

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3642359981
(Number (ISBN
364235999X
(Number (ISBN
9783642359989
(Number (ISBN
9783642359996

NATIONAL BIBLIOGRAPHY NUMBER

Number
b567751

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Selected Areas in Cryptography :
General Material Designation
[Book]
Other Title Information
19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers
First Statement of Responsibility
edited by Lars R. Knudsen, Huapeng Wu.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Berlin, Heidelberg
Name of Publisher, Distributor, etc.
Springer Berlin Heidelberg
Date of Publication, Distribution, etc.
2013

SERIES

Series Title
Lecture notes in computer science, 7707.

CONTENTS NOTE

Text of Note
Cryptanalysis.- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers.- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery.- Cryptanalysis of the Xiao - Lai White-Box AES Implementation.- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model.- Forward Secure Signatures on Smart Cards.- The Stafford Tavares Lecture Extracts from the SHA-3 Competition.- Stream CiphersCryptanalysis of the "Kindle" Cipher.- Cryptographically Strong de Bruijn Sequences with Large Periods.- Cryptanalysis of the Loiss Stream Cipher.- Implementations.- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three.- Efficient Implementation of Bilinear Pairings on ARM Processors.- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223.- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers.- Block Cipher Cryptanalysis.- All Subkeys Recovery Attack on Block Ciphers: ExtendingMeet-in-the-Middle Approach.- Improved Cryptanalysis of the Block Cipher KASUMI.- Meet-in-the-Middle Technique for Integral Attacks against FeistelCiphers.- Attacking (EC)DSA Given Only an Implicit Hint.- Lattice Reduction for Modular Knapsack.- Hash Functions.- The Boomerang Attacks on the Round-Reduced Skein-512.- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function.- Provable Security of BLAKE with Non-ideal Compression Function.- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms.- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions.- Miscellaneous.- Private Stream Search at Almost the Same Communication Cost as a Regular Search.- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks.

SUMMARY OR ABSTRACT

Text of Note
This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous.

TOPICAL NAME USED AS SUBJECT

Computer Communication Networks.
Computer science.
Data protection.

PERSONAL NAME - PRIMARY RESPONSIBILITY

edited by Lars R. Knudsen, Huapeng Wu.

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival