000 07056cam a2201105Ia 4500
001 ocn232363528
003 OCoLC
005 20200626101117.0
006 m o d
007 cr cn|||||||||
008 080620s2007 gw a ob 101 0 eng d
040 _aGW5XE
_beng
_epn
_cGW5XE
_dGW5XE
_dCOD
_dSTF
_dYNG
_dNUI
_dOCLCQ
_dMND
_dOCLCO
_dOCLCQ
_dOCLCF
_dEBLCP
_dBEDGE
_dVT2
_dOCLCQ
_dSLY
_dOCLCO
_dCOO
_dYDXCP
_dIDEBK
_dOCL
_dOCLCO
_dOCLCQ
_dOCLCO
_dDEBSZ
_dOCLCQ
_dOCLCA
_dOCLCQ
_dUAB
_dESU
_dOCLCQ
_dU3W
_dBUF
_dCEF
_dTFW
_dWYU
_dICG
_dYOU
_dW2U
_dUX1
_dOCLCQ
_dOL$
_dOCLCQ
_dAUD
_dHS0
_dERF
_dWURST
_dOCLCQ
019 _a191077982
_a230742935
_a288293623
_a485924741
_a613674634
_a739131008
_a880099257
_a1044564926
_a1056359014
_a1075491253
_a1077853903
_a1087004906
_a1091729484
_a1105590842
_a1112596945
020 _a9783540772729
020 _a3540772723
020 _a9783540772712
_q(pbk.)
020 _a3540772715
_q(pbk.)
024 7 _a10.1007/978-3-540-77272-9
_2doi
029 1 _aAU@
_b000042925028
029 1 _aAU@
_b000043372139
029 1 _aAU@
_b000058158505
029 1 _aDEBSZ
_b280566239
029 1 _aDKDLA
_b820120-katalog:000461622
029 1 _aHEBIS
_b198461518
029 1 _aNLGGC
_b384192432
029 1 _aNZ1
_b11622920
029 1 _aNZ1
_b13705052
035 _a(OCoLC)232363528
_z(OCoLC)191077982
_z(OCoLC)230742935
_z(OCoLC)288293623
_z(OCoLC)485924741
_z(OCoLC)613674634
_z(OCoLC)739131008
_z(OCoLC)880099257
_z(OCoLC)1044564926
_z(OCoLC)1056359014
_z(OCoLC)1075491253
_z(OCoLC)1077853903
_z(OCoLC)1087004906
_z(OCoLC)1091729484
_z(OCoLC)1105590842
_z(OCoLC)1112596945
037 _a978-3-540-77271-2
_bSpringer
_nhttp://www.springerlink.com
050 4 _aQA268
_b.C76 2007eb
072 7 _aQA
_2lcco
072 7 _aGPJ
_2bicssc
072 7 _aGPF
_2bicssc
072 7 _aCOM031000
_2bisacsh
082 0 4 _a003/.54
_222
084 _aTN918-532
_2clc
084 _aTP309-532
_2clc
084 _aDAT 465f
_2stub
084 _aDAT 580f
_2stub
084 _aSS 4800
_2rvk
049 _aMAIN
111 2 _aIMA International Conference
_n(11th :
_d2007 :
_cCirencester, England)
_925067
245 1 0 _aCryptography and coding :
_b11th IMA International Conference, Cirencester, UK, December 18-20, 2007 : proceedings /
_cSteven D. Galbraith (ed.).
246 3 0 _a11th IMA International Conference
246 3 _aEleventh IMA International Conference
246 3 0 _aIMA International Conference
260 _aBerlin ;
_aNew York :
_bSpringer,
_c©2007.
300 _a1 online resource (xi, 421 pages) :
_billustrations
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture notes in computer science,
_x0302-9743 ;
_v4887
490 1 _aLNCS sublibrary. SL 4, Security and cryptology
490 _aSerienbezeichnung
504 _aIncludes bibliographical references and index.
588 0 _aPrint version record.
520 _aThis book constitutes the refereed proceedings of the 11th IMA International Conference on Cryptography and Coding, held in Cirencester, UK in December 2007. The 22 revised full papers presented together with 2 invited contributions were carefully reviewed and selected from 48 submissions. The papers are organized in topical sections on signatures, boolean functions, block cipher cryptanalysis, side channels, linear complexity, public key encryption, curves, and RSA implementation.
505 0 _aInvited Papers -- Efficient Cryptographic Protocols Based on the Hardness of Learning Parity with Noise -- Galois Rings and Pseudo-random Sequences -- Signatures I -- Finding Invalid Signatures in Pairing-Based Batches -- How to Forge a Time-Stamp Which Adobe's Acrobat Accepts -- Efficient Computation of the Best Quadratic Approximations of Cubic Boolean Functions -- On the Walsh Spectrum of a New APN Function -- Non-linear Cryptanalysis Revisited: Heuristic Search for Approximations to S-Boxes -- Cryptanalysis of the EPBC Authenticated Encryption Mode -- Blockwise-Adaptive Chosen-Plaintext Attack and Online Modes of Encryption -- Algebraic Cryptanalysis of the Data Encryption Standard -- Cryptographic Side-Channels from Low-Power Cache Memory -- New Branch Prediction Vulnerabilities in OpenSSL and Necessary Software Countermeasures -- Remarks on the New Attack on the Filter Generator and the Role of High Order Complexity -- Modified Berlekamp-Massey Algorithm for Approximating the k-Error Linear Complexity of Binary Sequences -- Efficient KEMs with Partial Message Recovery -- Randomness Reuse: Extensions and Improvements -- On the Connection Between Signcryption and One-Pass Key Establishment -- Optimised Versions of the Ate and Twisted Ate Pairings -- Extractors for Jacobian of Hyperelliptic Curves of Genus 2 in Odd Characteristic -- Constructing Pairing-Friendly Elliptic Curves Using Gröbner Basis Reduction -- Efficient 15,360-bit RSA Using Woop-Optimised Montgomery Arithmetic -- Toward Acceleration of RSA Using 3D Graphics Hardware -- Signatures II -- Multi-key Hierarchical Identity-Based Signatures -- Verifier-Key-Flexible Universal Designated-Verifier Signatures.
650 0 _aCoding theory
_vCongresses.
_915981
650 0 _aCryptography
_vCongresses.
_914592
650 0 7 _aCryptography.
_2cct
_925068
650 0 7 _aCoding theory.
_2cct
_91927
650 7 _aInformatique.
_2eclas
_914930
650 7 _aCoding theory.
_2fast
_0(OCoLC)fst00866237
_91927
650 7 _aCryptography.
_2fast
_0(OCoLC)fst00884552
_925068
650 7 _aMathematics.
_2hilcc
_925069
650 7 _aEngineering & Applied Sciences.
_2hilcc
_99023
650 7 _aPhysical Sciences & Mathematics.
_2hilcc
_911926
650 7 _aAlgebra.
_2hilcc
_93817
650 7 _aComputer Science.
_2hilcc
_9941
653 0 0 _awiskunde
653 0 0 _amathematics
653 0 0 _acomputerwetenschappen
653 0 0 _acomputer sciences
653 0 0 _ainformatietheorie
653 0 0 _ainformation theory
653 0 0 _acomputernetwerken
653 0 0 _acomputer networks
653 0 0 _agegevensbeheer
653 0 0 _adata management
653 1 0 _aInformation and Communication Technology (General)
653 1 0 _aInformatie- en communicatietechnologie (algemeen)
655 4 _aElectronic books.
_9396
655 7 _aConference papers and proceedings.
_2fast
_0(OCoLC)fst01423772
_96065
700 1 _aGalbraith, Steven D.
_925070
776 0 8 _iPrint version:
_aIMA International Conference (11th : 2007 : Cirencester, England).
_tCryptography and coding.
_dBerlin ; New York : Springer, ©2007
_z9783540772712
_z3540772715
_w(DLC) 2007940956
_w(OCoLC)185038882
830 0 _aLecture notes in computer science ;
_v4887.
_x0302-9743
_925071
830 0 _aLNCS sublibrary.
_nSL 4,
_pSecurity and cryptology.
_920708
856 4 0 _uhttps://link-springer-com.libraryproxy.ist.ac.at/book/10.1007/978-3-540-77272-9
938 _aProQuest Ebook Central
_bEBLB
_nEBL337129
938 _aProQuest MyiLibrary Digital eBook Collection
_bIDEB
_ncis23784387
938 _aYBP Library Services
_bYANK
_n2809926
994 _a92
_bATIST
999 _c377520
_d377520