Advances in Cryptology — EUROCRYPT `92, Rainer A. Rueppel
Автор: Jean-S?bastien Coron; Jesper Buus Nielsen Название: Advances in Cryptology – EUROCRYPT 2017 ISBN: 331956613X ISBN-13(EAN): 9783319566139 Издательство: Springer Рейтинг: Цена: 12577.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. obfuscation and functional encryption; provable security for symmetric cryptography;
Автор: Jean-S?bastien Coron; Jesper Buus Nielsen Название: Advances in Cryptology – EUROCRYPT 2017 ISBN: 3319566164 ISBN-13(EAN): 9783319566160 Издательство: Springer Рейтинг: Цена: 12577.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The three-volume proceedings LNCS 10210-10212 constitute the thoroughly refereed proceedings of the 36th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2017, held in Paris, France, in April/May 2017. obfuscation and functional encryption; provable security for symmetric cryptography;
Автор: Johansson Thomas Название: Advances in Cryptology - EUROCRYPT 2013 ISBN: 3642383475 ISBN-13(EAN): 9783642383472 Издательство: Springer Цена: 12159.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Candidate Multilinear Maps from Ideal Lattices.- Lossy Codes and a New Variant of the Learning-With-Errors Problem.- A Toolkit for Ring-LWE Cryptography.- Regularity of Lossy RSA on Subdomains and Its Applications.- Efficient Cryptosystems from 2k-th Power Residue Symbols.- Deterministic Public-Key Encryption for Adaptively Chosen Plaintext Distributions.- How to Watermark Cryptographic Functions.- Security Evaluations beyond Computing Power: How to Analyze Side-Channel Attacks You Cannot Mount?.- Masking against Side-Channel Attacks: A Formal Security Proof.- Leakage-Resilient Cryptography from Minimal Assumptions.- Faster Index Calculus for the Medium Prime Case Application to 1175-bit and 1425-bit Finite Fields.- Fast Cryptography in Genus 2.- Graph-Theoretic Algorithms for the "Isomorphism of Polynomials" Problem.- Cryptanalysis of Full RIPEMD-128.- New Collision Attacks on SHA-1 Based on Optimal Joint Local-Collision Analysis.- Improving Local Collisions: New Attacks on Reduced SHA-256.- Dynamic Proofs of Retrievability via Oblivious RAM .- Message-Locked Encryption and Secure Deduplication.- Batch Fully Homomorphic Encryption over the Integers.- Practical Homomorphic MACs for Arithmetic Circuits.- Streaming Authenticated Data Structures.- Improved Key Recovery Attacks on Reduced-Round AES in the Single-Key Setting.- New Links between Differential and Linear Cryptanalysis.- Towards Key-Length Extension with Optimal Security: Cascade Encryption and Xor-cascade Encryption.- Ideal-Cipher (Ir)reducibility for Blockcipher-Based Hash Functions.- Limitations of the Meta-reduction Technique: The Case of Schnorr Signatures.- Practical Signatures from Standard Assumptions.- Locally Computable UOWHF with Linear Shrinkage.- Amplification of Chosen-Ciphertext Security.- Circular Chosen-Ciphertext Security with Compact Ciphertexts.- MiniLEGO: Efficient Secure Two-Party Computation from General Assumptions.- How to Hide Circuits in MPC an Efficient Framework for Private Function Evaluation.- Multi-party Computation of Polynomials and Branching Programs without Simultaneous Interaction.- Quantum-Secure Message Authentication Codes.- One-Sided Device-Independent QKD and Position-Based Cryptography from Monogamy Games.- Quadratic Span Programs and Succinct NIZKs without PCPs.- Zero-Knowledge Argument for Polynomial Evaluation with Application to Blacklists.- Resource-Restricted Indifferentiability.- On Concurrently Secure Computation in the Multiple Ideal Query Model.- Universally Composable Secure Computation with (Malicious) Physically Uncloneable Functions.- How to Garble RAM Programs?.
Автор: Birgit Pfitzmann Название: Advances in Cryptology — EUROCRYPT 2001 ISBN: 3540420703 ISBN-13(EAN): 9783540420705 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: EUROCRYPT 2001, the 20th annual Eurocrypt conference, was sponsored by the IACR, the International Association for Cryptologic Research, see http: //www. iacr. org/, this year in cooperation with the Austrian Computer - ciety (OCG). The General Chair, Reinhard Posch, was responsible for local or- nization, and registration was handled by the IACR Secretariat at the University of California, Santa Barbara. In addition to the papers contained in these proceedings, we were pleased that the conference program also included a presentation by the 2001 IACR d- tinguished lecturer, Andrew Odlyzko, on "Economics and Cryptography" and an invited talk by Silvio Micali, "Zero Knowledge Has Come of Age. " Furthermore, there was the rump session for presentations of recent results and other (p- sibly satirical) topics of interest to the crypto community, which Jean-Jacques Quisquater kindly agreed to run. The Program Committee received 155 submissions and selected 33 papers for presentation; one of them was withdrawn by the authors. The review process was therefore a delicate and challenging task for the committee members, and I wish to thank them for all the e?ort they spent on it. Each committee member was responsible for the review of at least 20 submissions, so each paper was carefully evaluated by at least three reviewers, and submissions with a program committee member as a (co-)author by at least six.
Автор: Elisabeth Oswald; Marc Fischlin Название: Advances in Cryptology -- EUROCRYPT 2015 ISBN: 3662467992 ISBN-13(EAN): 9783662467992 Издательство: Springer Рейтинг: Цена: 13416.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cryptanalysis of the Multilinear Map over the Integers.- Robust Authenticated-Encryption AEZ and the Problem That It Solves.- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks.- A Provable-Security Analysis of Intel's Secure Key RNG.- A Formal Treatment of Backdoored Pseudorandom Generators.- Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields.- The Multiple Number Field Sieve with Conjugation and Generalized.- Better Algorithms for LWE and LWR.- On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes.- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.- Structural Evaluation by Generalized Integral Property.- Cryptanalysis of SP Networks with Partial Non-Linear Layers.- The Sum Can Be Weaker Than Each Part.- SPHINCS: Practical Stateless Hash-Based Signatures.- Making Masking Security Proofs Concrete: Or How to Evaluate the Security of Any Leaking Device.- Ciphers for MPC and FHE.- Verified Proofs of Higher-Order Masking.- Inner Product Masking Revisited.- Fully Homomophic Encryption over the Integers Revisited.- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces .- KDM-CCA Security from RKA Secure Authenticated Encryption.- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks.- FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.- Bootstrapping for HElib.- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.- How to Efficiently Evaluate RAM Programs with Malicious Security.- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.- Twisted Polynomials and Forgery Attacks on GCM.- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices.
Автор: Marc Fischlin; Jean-S?bastien Coron Название: Advances in Cryptology – EUROCRYPT 2016 ISBN: 3662498952 ISBN-13(EAN): 9783662498958 Издательство: Springer Рейтинг: Цена: 14814.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume proceedings LNCS 9665 + 9666constitutes the thoroughly refereed proceedings of the 35th AnnualInternational Conference on the Theory and Applications of CryptographicTechniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
Автор: Walter Fumy Название: Advances in Cryptology — EUROCRYPT `97 ISBN: 3540629750 ISBN-13(EAN): 9783540629757 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Henri Gilbert Название: Advances in Cryptology - EUROCRYPT 2010 ISBN: 3642131891 ISBN-13(EAN): 9783642131899 Издательство: Springer Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Автор: Fischlin Название: Advances in Cryptology – EUROCRYPT 2016 ISBN: 3662498898 ISBN-13(EAN): 9783662498897 Издательство: Springer Рейтинг: Цена: 13696.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume proceedings LNCS 9665 + LNCS 9666 constitutes the thoroughly refereed proceedings of the 35th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2016, held in Vienna, Austria, in May 2016.
Автор: Ueli Maurer Название: Advances in Cryptology — EUROCRYPT `96 ISBN: 354061186X ISBN-13(EAN): 9783540611868 Издательство: Springer Рейтинг: Цена: 11179.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The EUROCRYPT '96 conference was sponsored by the International Asso- ation for Cryptologic Research (IACR)l, in cooperation with the University of Saragossa. It took place at the Palacio de Congresos in Saragossa, Spain, during May 12-16, 1996. This was the fifteenth annual EUROCRYPT conference (this name has been used since the third conference held in 1984), each of which has been held in a different city in Europe. For the second time, proceedings were available at the conference. JosC Pastor Franco, the General Chair, was resp- sible for local organization and registration. His contribution to the snccess of the conference is gratefully acknowledged. The Program Committee considered 126 submitted papers and selected 34 for presentation. Each paper was sent to all members of the Program Committee and was assigned to at least three of them for careful evaluation. There were also two invited talks. James L. Massey, this year's IACR Distinguished Ltcturer, gave a lecture entitled "The difficulty with difficulty". Massey is the third to receive this honor, the first two being Gustavus Simmons and Adi Shamir. Shafi Goldwasser gave an invited talk entitled "Multi party secure protocols: past and present". These proceedings contain revised versions of the 34 contributed talks. While the papers were carefully selected, they have not been refereed like submissions to a refereed journal. The authors bear full responsibility for the contents of their papers. Some authors may write final versions of their papers for publication in a refereed journal.
Автор: Bart Preneel Название: Advances in Cryptology - EUROCRYPT 2000 ISBN: 3540675175 ISBN-13(EAN): 9783540675174 Издательство: Springer Рейтинг: Цена: 16070.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This title constitutes 39 revised full papers divided in topical sections of factoring and discrete logarithm, digital signatures, private information retrieval, key management protocols, threshold cryptography, and public-key encryption amongst other security issues.
Автор: Elisabeth Oswald; Marc Fischlin Название: Advances in Cryptology - EUROCRYPT 2015 ISBN: 3662468026 ISBN-13(EAN): 9783662468029 Издательство: Springer Рейтинг: Цена: 13416.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Universal Signature Aggregators.- Fully Structure-Preserving Signatures and Shrinking Commitments.- Disjunctions for Hash Proof Systems: New Constructions and Applications.- Quasi-Adaptive NIZK for Linear Subspaces Revisited.- Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware.- Noisy Leakage .- Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge.- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates.- One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.- The Bitcoin Backbone Protocol: Analysis and Applications.- Linear Secret Sharing Schemes from Error Correcting Codes.- Function Secret Sharing.- Cluster Computing in Zero Knowledge.- Hosting Services on an Untrusted Cloud.- How to Obfuscate Programs Directly.- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings.- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model.- Cryptographic Reverse Firewalls.- Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols.- Authenticated Key Exchange from Ideal Lattices.- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model.- Privacy Amplification in the Isolated Qubits Model.- Generic Hardness of the Multiple Discrete Logarithm Problem.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru