000 | 04588nam a22006495i 4500 | ||
---|---|---|---|
001 | 978-3-319-71667-1 | ||
003 | DE-He213 | ||
005 | 20210120143307.0 | ||
007 | cr nn 008mamaa | ||
008 | 171129s2017 gw | s |||| 0|eng d | ||
020 |
_a9783319716671 _9978-3-319-71667-1 |
||
024 | 7 |
_a10.1007/978-3-319-71667-1 _2doi |
|
050 | 4 | _aQA76.9.A25 | |
072 | 7 |
_aUR _2bicssc |
|
072 | 7 |
_aCOM053000 _2bisacsh |
|
072 | 7 |
_aUR _2thema |
|
082 | 0 | 4 |
_a005.8 _223 |
245 | 1 | 0 |
_aProgress in Cryptology – INDOCRYPT 2017 _h[electronic resource] : _b18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings / _cedited by Arpita Patra, Nigel P. Smart. |
250 | _a1st ed. 2017. | ||
264 | 1 |
_aCham : _bSpringer International Publishing : _bImprint: Springer, _c2017. |
|
300 |
_aXII, 403 p. 68 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aSecurity and Cryptology ; _v10698 _aLecture Notes in Computer Science _v10698 |
|
505 | 0 | _aPost-Quantum Cryptography using Module Lattices -- Recent Advances in Function & Homomorphic Secret Sharing -- A note on Ring-LWE security in the case of Fully Homomorphic Encryption -- Architecture level Optimizations for Kummer based HECC on FPGAs -- Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round -- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient -- Cold Boot Attacks on NTRU -- DSA Signing Key Recovery with Noisy Side Channels and Varying Error Rates -- Fast Scalar Multiplication for Elliptic Curves over Binary Fields -- Field lifting for smaller UOV public keys -- Gabidulin matrix codes and their application to small ciphertext size cryptosystems -- Lightweight Design Choices for LED-like Block Ciphers -- Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption -- Improved Differential Cryptanalysis on Generalized Feistel Schemes -- Improvements for Gate-Hiding Garbled Circuits -- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p_q -- Revisiting a Masked Lookup-Table Compression Scheme.- . | |
520 | _aThis book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions. | ||
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aAlgorithms. | |
650 | 0 | _aManagement information systems. | |
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer security. | |
650 | 0 | _aComputer science—Mathematics. | |
650 | 1 | 4 |
_aSecurity. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28000 |
650 | 2 | 4 |
_aCryptology. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28020 |
650 | 2 | 4 |
_aAlgorithm Analysis and Problem Complexity. _0https://scigraph.springernature.com/ontologies/product-market-codes/I16021 |
650 | 2 | 4 |
_aManagement of Computing and Information Systems. _0https://scigraph.springernature.com/ontologies/product-market-codes/I24067 |
650 | 2 | 4 |
_aSystems and Data Security. _0https://scigraph.springernature.com/ontologies/product-market-codes/I28060 |
650 | 2 | 4 |
_aDiscrete Mathematics in Computer Science. _0https://scigraph.springernature.com/ontologies/product-market-codes/I17028 |
700 | 1 |
_aPatra, Arpita. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
700 | 1 |
_aSmart, Nigel P. _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783319716664 |
776 | 0 | 8 |
_iPrinted edition: _z9783319716688 |
830 | 0 |
_aSecurity and Cryptology ; _v10698 |
|
830 | 0 |
_aLecture Notes in Computer Science ; _v10698 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/978-3-319-71667-1 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
942 | _cEBK | ||
999 |
_c57134 _d57134 |