• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History

عنوان
Topics in Cryptology - CT-RSA 2013 :

پدید آورنده
edited by Ed Dawson.

موضوع
Computer networks.,Computer science.,Operating systems (Computers)

رده
QA76
.
9
.
A25
E358
2013

کتابخانه
Center and Library of Islamic Studies in European Languages

محل استقرار
استان: Qom ـ شهر: Qom

Center and Library of Islamic Studies in European Languages

تماس با کتابخانه : 32910706-025

INTERNATIONAL STANDARD BOOK NUMBER

(Number (ISBN
3642360947
(Number (ISBN
3642360955
(Number (ISBN
9783642360947
(Number (ISBN
9783642360954

NATIONAL BIBLIOGRAPHY NUMBER

Number
b567759

TITLE AND STATEMENT OF RESPONSIBILITY

Title Proper
Topics in Cryptology - CT-RSA 2013 :
General Material Designation
[Book]
Other Title Information
the Cryptographers' Track at the RSA Conference 2013, San Francisco, CA, USA, February 25-March 1, 2013. Proceedings
First Statement of Responsibility
edited by Ed Dawson.

.PUBLICATION, DISTRIBUTION, ETC

Place of Publication, Distribution, etc.
Berlin, Heidelberg Springer Berlin Heidelberg Imprint
Name of Publisher, Distributor, etc.
Springer
Date of Publication, Distribution, etc.
2013

PHYSICAL DESCRIPTION

Specific Material Designation and Extent of Item
(XIV, 405 pages 68 illustrations)

SERIES

Series Title
Lecture notes in computer science, 7779.

CONTENTS NOTE

Text of Note
Side Channel Attacks I --; Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL --; Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party --; Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures --; Public-Key Encryption I --; Robust and Plaintext-Aware Variant of Signed ElGamal Encryption --; Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks --; Cryptographic Protocols I --; Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes --; Randomized Partial Checking Revisited --; Secure Implementation Methods --; Randomly Failed! The State of Randomness in Current Java Implementations --; Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl --; Symmetric Key Primitives I --; Collisions for the WIDEA-8 Compression Function --; Finding Collisions for Round-Reduced SM3 --; Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures --; Side Channel Attacks II --; Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag --; Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness --; Cryptographic Protocols II --; Cryptanalytic Attacks on MIFARE Classic Protocol --; Asynchronous Computational VSS with Reduced Communication Complexity --; Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 --; Solving BDD by Enumeration: An Update --; Identity-Based Encryption --; The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions --; Accountable Authority Identity-Based Encryption with Public Traceability --; Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption --; Symmetric Key Primitives II --; The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users --; A Fully Homomorphic Cryptosystem with Approximate Perfect Secrecy --; Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.

SUMMARY OR ABSTRACT

Text of Note
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.

TOPICAL NAME USED AS SUBJECT

Computer networks.
Computer science.
Operating systems (Computers)

LIBRARY OF CONGRESS CLASSIFICATION

Class number
QA76
.
9
.
A25
Book number
E358
2013

PERSONAL NAME - PRIMARY RESPONSIBILITY

edited by Ed Dawson.

PERSONAL NAME - ALTERNATIVE RESPONSIBILITY

Ed Dawson

ELECTRONIC LOCATION AND ACCESS

Electronic name
 مطالعه متن کتاب 

[Book]

Y

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival