Cryptography and information security in the Balkans : (Record no. 644582)

MARC details
000 -LEADER
fixed length control field 06793cam a2200793 i 4500
001 - CONTROL NUMBER
control field ocn946027947
003 - CONTROL NUMBER IDENTIFIER
control field OCoLC
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250703164653.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field m o d
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field cr cnu|||unuuu
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 160406s2016 sz a o 101 0 eng d
040 ## - CATALOGING SOURCE
Original cataloging agency GW5XE
Language of cataloging eng
Description conventions rda
-- pn
Transcribing agency GW5XE
Modifying agency OCLCO
-- OCLCF
-- OCLCO
-- KSU
-- DGU
-- IAD
-- JBG
-- ICW
-- Z5A
-- ILO
-- ICN
-- ESU
-- IOG
-- U3W
-- OCLCA
-- BUF
-- JG0
-- TFW
-- EBLCP
-- WYU
-- UKMGB
-- UX1
-- OCLCQ
-- AJS
-- SFB
-- NLW
-- OCLCO
-- UKAHL
-- OCLCO
-- OCLCQ
-- OCLCO
-- OCLCL
015 ## - NATIONAL BIBLIOGRAPHY NUMBER
National bibliography number GBB8N3492
Source bnb
016 7# - NATIONAL BIBLIOGRAPHIC AGENCY CONTROL NUMBER
Record control number 019148728
Source Uk
019 ## -
-- 1229054075
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9783319291727
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 3319291726
Qualifying information (electronic bk.)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
Canceled/invalid ISBN 9783319291710
024 7# - OTHER STANDARD IDENTIFIER
Standard number or code 10.1007/978-3-319-29172-7
Source of number or code doi
029 1# - (OCLC)
OCLC library identifier AU@
System control number 000057668801
029 1# - (OCLC)
OCLC library identifier DKDLA
System control number 820120-katalog:999914504305765
029 1# - (OCLC)
OCLC library identifier UKMGB
System control number 019148728
035 ## - SYSTEM CONTROL NUMBER
System control number (OCoLC)946027947
Canceled/invalid control number (OCoLC)1229054075
037 ## - SOURCE OF ACQUISITION
Stock number com.springer.onix.9783319291727
Source of stock number/acquisition Springer Nature
050 #4 - LIBRARY OF CONGRESS CALL NUMBER
Classification number QA76.9.A25
072 #7 - SUBJECT CATEGORY CODE
Subject category code URY
Source bicssc
072 #7 - SUBJECT CATEGORY CODE
Subject category code COM053000
Source bisacsh
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8/2
Edition number 23
049 ## - LOCAL HOLDINGS (OCLC)
Holding library MAIN
111 2# - MAIN ENTRY--MEETING NAME
Meeting name or jurisdiction name as entry element BalkanCryptSec (Conference)
Number of part/section/meeting (2nd :
Date of meeting 2015 :
Location of meeting Koper, Slovenia)
9 (RLIN) 56771
245 10 - TITLE STATEMENT
Title Cryptography and information security in the Balkans :
Remainder of title second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised selected papers /
Statement of responsibility, etc. Enes Pasalic, Lars R. Knudsen (eds.).
246 3# - VARYING FORM OF TITLE
Title proper/short title BalkanCryptSec 2015
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Switzerland :
Name of producer, publisher, distributor, manufacturer Springer,
Date of production, publication, distribution, manufacture, or copyright notice 2016.
300 ## - PHYSICAL DESCRIPTION
Extent 1 online resource (viii, 207 pages) :
Other physical details illustrations
336 ## - CONTENT TYPE
Content type term text
Content type code txt
Source rdacontent
337 ## - MEDIA TYPE
Media type term computer
Media type code c
Source rdamedia
338 ## - CARRIER TYPE
Carrier type term online resource
Carrier type code cr
Source rdacarrier
490 1# - SERIES STATEMENT
Series statement Lecture notes in computer science,
International Standard Serial Number 0302-9743 ;
Volume/sequential designation 9540
490 1# - SERIES STATEMENT
Series statement LNCS sublibrary. SL 4, Security and cryptology
500 ## - GENERAL NOTE
General note Includes author index.
588 0# - SOURCE OF DESCRIPTION NOTE
Source of description note Online resource; title from PDF title page (SpringerLink, viewed April 6, 2016).
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Intro; Preface; Organization; Contents; Symmetric Key Cryptography; Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed -- Muller Codes; 1 Introduction; 2 Preliminaries; 3 Revisiting Secondary Constructions with Maximum AI; 4 Codewords of RM*(n−1 2 , n) as Annihilators; 5 Application to the Carlet -- Feng Construction; 6 Conclusions; References; Results on Characterizations of Plateaued Functions in Arbitrary Characteristic; 1 Introduction; 2 Preliminaries; 3 Characterizations of Plateaued Functions; 4 Characterizations of Bent and Plateaued Functions
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 5 Characterization of Vectorial Bent Functions6 Characterizations of Vectorial s-Plateaued Functions; 7 Conclusion; References; Cryptographically Strong S-Boxes Generated by Modified Immune Algorithm; 1 Introduction and Motivation; 1.1 Contribution; 2 Preliminaries; 2.1 Boolean Functions; 2.2 Vectorial Boolean Functions; 3 Heuristic Techniques; 4 New Method; 4.1 Algorithm Description; 4.2 Algorithm Pseudo-code; 5 Experimental Results; 5.1 Results Obtained by SpImmAlg in the Case of (8 8) Bijective S-boxes; 6 Conclusions; A Appendix; References; Cryptanalysis
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note Analysis of the Authenticated Cipher MORUS (v1)1 Introduction; 2 Description of MORUS; 3 Distinguisher; 4 Differential Biases After Initialization; 5 Collisions in the StateUpdate(S, M) Function; 6 On Producing a Tag Forgery; 7 Conclusions; A Proof of Theorem 1; B Derivation of the System of Equations (33) in Sect. 6; References; Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes; 1 Introduction; 2 Preliminaries; 2.1 Notations and Definitions; 2.2 A Brief Overview of Matsui's Work; 2.3 Our Experiment; 3 Properties of LATs of S-boxes with Embedded Parity Check
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note 3.1 The Part of LATs with Non-zero Input and Output Masks3.2 The Part of LATs Containing Zero Masks; 4 The Decreasing Effectiveness for Small Number of Rounds; 5 Construction of Best Characteristics; 5.1 Basic Search Algorithm (BSA); 5.2 Application to the DES Cipher; 5.3 Adaptation in Case of S-boxes with Embedded Parity Check; 6 Results and Their Analysis; 6.1 Effects of Embedding Parity Check; 6.2 Best Probabilities; 6.3 Best Characteristics: Number and Type; 6.4 Comparison of Best Multi-round Approximate Expressions; 7 Conclusions; A Basic Search Algorithm; B Generalized Cipher
505 8# - FORMATTED CONTENTS NOTE
Formatted contents note C More Details About 16-round Best ApproximationsD Two-Round Iterative Characteristics Based on Two or More Active S-boxes Per Round; References; Time-Advantage Ratios Under Simple Transformations: Applications in Cryptography; 1 Introduction; 1.1 Reduction-Based Security Proofs; 1.2 Quantifying Security for a Given Adversary; 1.3 Quantifying Security Losses in Reductions; 1.4 Problem Statement; 2 Our Results and Techniques; 2.1 The Time-Success Ratio Under Reductions; 2.2 Application to Pseudoentropy Chain Rules; 2.3 Application to Leakage-Resilient Stream Ciphers
520 ## - SUMMARY, ETC.
Summary, etc. This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption.
546 ## - LANGUAGE NOTE
Language note English.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
Form subdivision Congresses.
9 (RLIN) 15030
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Form subdivision Congresses.
9 (RLIN) 14968
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Chiffrement (Informatique)
Form subdivision Congrès.
9 (RLIN) 16510
650 #6 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Sécurité informatique
Form subdivision Congrès.
9 (RLIN) 17411
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security.
Source of heading or term bicssc
9 (RLIN) 2191
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Coding theory & cryptology.
Source of heading or term bicssc
9 (RLIN) 53461
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computers
General subdivision Security
-- General.
Source of heading or term bisacsh
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Computer security
Source of heading or term fast
9 (RLIN) 2191
650 #7 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name as entry element Data encryption (Computer science)
Source of heading or term fast
9 (RLIN) 13647
655 #7 - INDEX TERM--GENRE/FORM
Genre/form data or focus term Conference papers and proceedings
Source of term fast
9 (RLIN) 6065
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Pasalic, Enes,
Relator term editor.
9 (RLIN) 56773
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Knudsen, Lars,
Dates associated with a name 1962-
Relator term editor.
-- https://id.oclc.org/worldcat/entity/E39PBJxxcWtm8pvQvKvCWfBdcP
9 (RLIN) 47414
758 ## -
-- has work:
-- Cryptography and information security in the Balkans (Text)
-- https://id.oclc.org/worldcat/entity/E39PCGVJXDXXttfKVYcv3Mxtw3
-- https://id.oclc.org/worldcat/ontology/hasWork
776 0# - ADDITIONAL PHYSICAL FORM ENTRY
International Standard Book Number 3319291718
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title Lecture notes in computer science ;
Volume number/sequential designation 9540.
International Standard Serial Number 0302-9743
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE
Uniform title LNCS sublibrary.
Number of part/section of a work SL 4,
Name of part/section of a work Security and cryptology.
9 (RLIN) 20708
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier <a href="https://link.springer.com/10.1007/978-3-319-29172-7">https://link.springer.com/10.1007/978-3-319-29172-7</a>
938 ## -
-- Askews and Holts Library Services
-- ASKH
-- AH31357712
938 ## -
-- ProQuest Ebook Central
-- EBLB
-- EBL5588200
994 ## -
-- 92
-- ATIST
Holdings
Withdrawn status Lost status Damaged status Not for loan Collection code Home library Current library Date acquired Total Checkouts Date last seen Price effective from Koha item type
  Not Lost     eBook LNCS e-Library e-Library 29/07/2022   29/07/2022 29/07/2022 eBook

Powered by Koha