Detailansicht

Progress in Cryptology - INDOCRYPT 2012

13th International Conference on Cryptology in India, Kolkata, India, December 9-12,2012, Proceedings - Lecture Notes in Computer Science 7668, Lecture Notes in Computer Science 7668 - Security and Cryptology
ISBN/EAN: 9783642349300
Umbreit-Nr.: 4076836

Sprache: Englisch
Umfang: xiv, 566 S., 118 s/w Illustr., 566 p. 118 illus.
Format in cm: 3.4 x 23.5 x 15.6
Einband: kartoniertes Buch

Erschienen am 29.10.2012
Auflage: 1/2012
€ 53,49
(inklusive MwSt.)
Lieferbar innerhalb 1 - 2 Wochen
  • Zusatztext
    • InhaltsangabeHow to Compute on Encrypted Data.- Using the Cloud to Determine Key Strengths.- On the Non-malleability of the Fiat-Shamir Transform.- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84.- Leakage Squeezing of Order Two.- Hash Functions and Stream Cipher.- Collision Attack on the Hamsi-256 Compression Function.- Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks.- A Di_erential Fault Attack on the Grain Family under Reasonable Assumptions.- Faster Chosen-Key Distinguishers on Reduced-Round AES.- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System.- Computing Small Discrete Logarithms Faster.- Embedded Syndrome-Based Hashing.- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA.- A New Model of Binary Elliptic Curves.- Symmetric Key Design and Provable Security SipHash: a fast short-input PRF.
  • Kurztext
    • Fast conference proceedingsState-of-the-art reportUp to date results
  • Autorenportrait
    • InhaltsangabeHow to Compute on Encrypted Data.- Using the Cloud to Determine Key Strengths.- On the Non-malleability of the Fiat-Shamir Transform.- Another Look at Symmetric Incoherent Optimal Eavesdropping against BB84.- Leakage Squeezing of Order Two.- Hash Functions and Stream Cipher.- Collision Attack on the Hamsi-256 Compression Function.- Generalized Iterated Hash Fuctions Revisited: New Complexity Bounds for Multicollision Attacks.- A Di_erential Fault Attack on the Grain Family under Reasonable Assumptions.- Faster Chosen-Key Distinguishers on Reduced-Round AES.- High-Speed Parallel Implementations of the Rainbow Method in a Heterogeneous System.- Computing Small Discrete Logarithms Faster.- Embedded Syndrome-Based Hashing.- Compact Hardware Implementations of the Block Ciphers mCrypton, NOEKEON, and SEA.- A New Model of Binary Elliptic Curves.- Symmetric Key Design and Provable Security SipHash: a fast short-input PRF.