| 000 | 06760cam a2200973 a 4500 | ||
|---|---|---|---|
| 001 | ocn697275862 | ||
| 003 | OCoLC | ||
| 005 | 20250703160422.0 | ||
| 006 | m o d | ||
| 007 | cr cn||||||||| | ||
| 008 | 110118s2010 gw a ob 101 0 eng d | ||
| 040 |
_aGW5XE _beng _epn _cGW5XE _dOUN _dVLB _dCUS _dCEF _dOCLCQ _dE7B _dOCLCO _dOCLCQ _dOCLCF _dBEDGE _dOCLCQ _dOCLCO _dNLGGC _dSLY _dYDXCP _dOCL _dOCLCO _dOCLCQ _dOCLCO _dEBLCP _dOCLCQ _dMYUTM _dSHS _dOCLCA _dUAB _dESU _dOCLCQ _dIOG _dBUF _dTFW _dU3W _dCNTRU _dOCLCQ _dOCLCO _dCOM _dOCLCO _dOCLCQ _dDCT _dLUN _dQGK _dOCLCO _dOCLCL _dOCLCQ _dOCLCL |
||
| 019 |
_a692183689 _a695387530 _a695392608 _a698590315 _a769767725 _a880312148 _a1204009444 _a1259252613 |
||
| 020 |
_a9783642174018 _q(electronic bk.) |
||
| 020 |
_a3642174019 _q(electronic bk.) |
||
| 020 |
_z9783642174001 _q(pbk.) |
||
| 020 |
_z3642174000 _q(pbk.) |
||
| 020 | _a1280390549 | ||
| 020 | _a9781280390548 | ||
| 020 | _a9786613568465 | ||
| 020 | _a6613568465 | ||
| 024 | 7 |
_a10.1007/978-3-642-17401-8 _2doi |
|
| 029 | 1 |
_aAU@ _b000048657526 |
|
| 029 | 1 |
_aAU@ _b000051338565 |
|
| 029 | 1 |
_aAU@ _b000060477721 |
|
| 029 | 1 |
_aNLGGC _b330816101 |
|
| 029 | 1 |
_aNZ1 _b13668937 |
|
| 029 | 1 |
_aDKDLA _b820120-katalog:999912972205765 |
|
| 035 |
_a(OCoLC)697275862 _z(OCoLC)692183689 _z(OCoLC)695387530 _z(OCoLC)695392608 _z(OCoLC)698590315 _z(OCoLC)769767725 _z(OCoLC)880312148 _z(OCoLC)1204009444 _z(OCoLC)1259252613 |
||
| 037 |
_a9783642174001 _bSpringer _nhttp://www.springerlink.com |
||
| 050 | 4 | _aQA76.9.A25 | |
| 050 | 4 |
_aZ103 _b.I58 2010 |
|
| 072 | 7 |
_aQA _2lcco |
|
| 072 | 7 |
_aURY _2bicssc |
|
| 072 | 7 |
_aCOM053000 _2bisacsh |
|
| 082 | 0 | 4 |
_a652/.8 _222 |
| 084 |
_a54.62 _2bcl |
||
| 084 |
_aTN918. 1-532 _2clc |
||
| 084 |
_aTP309. 7-532 _2clc |
||
| 049 | _aMAIN | ||
| 111 | 2 |
_aInternational Conference in Cryptology in India _n(11th : _d2010 : _cHyderabad, India) _941238 |
|
| 245 | 1 | 0 |
_aProgress in cryptology--INDOCRYPT 2010 : _b11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010 : proceedings / _cGuang Gong, Kishan Chand Gupta (eds.). |
| 246 | 3 | 0 | _aINDOCRYPT 2010 |
| 260 |
_aBerlin : _bSpringer, _c2010. |
||
| 300 |
_a1 online resource (xv, 363 pages) : _billustrations |
||
| 336 |
_atext _btxt _2rdacontent |
||
| 337 |
_acomputer _bc _2rdamedia |
||
| 338 |
_aonline resource _bcr _2rdacarrier |
||
| 347 |
_atext file _bPDF _2rda |
||
| 490 | 1 |
_aLecture notes in computer science, _x0302-9743 ; _v6498 |
|
| 490 | 1 | _aLNCS sublibrary. SL 4, Security and cryptology | |
| 504 | _aIncludes bibliographical references and index. | ||
| 520 | _aThis book constitutes the refereed proceedings of the 11th International Conference on Cryptology in India, INDOCRYPT 2010, held in Hyderabad, India, in December 2010. The 22 revised full papers were carefully reviewed and selected from 72 submissions. The papers are organized in topical sections on security of RSA and multivariate schemes; security analysis, pseudorandom permutations and applications; hash functions; attacks on block ciphers and stream ciphers; fast cryptographic computation; cryptanalysis of AES; and efficient implementation. | ||
| 505 | 0 | _aInvited Talk -- Getting a Few Things Right and Many Things Wrong -- Security of RSA and Multivariate Schemes -- Partial Key Exposure Attack on RSA -- Improvements for Limited Lattice Dimensions -- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks -- CyclicRainbow -- A Multivariate Signature Scheme with a Partially Cyclic Public Key -- Security Analysis, Pseudorandom Permutations and Applications -- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols -- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations -- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants -- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface -- Invited Talk -- Cryptographic Hash Functions: Theory and Practice -- Hash Functions -- Cryptanalysis of Tav-128 Hash Function -- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing -- Speeding Up the Wide-Pipe: Secure and Fast Hashing -- Attacks on Block Ciphers and Stream Ciphers -- New Boomerang Attacks on ARIA -- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers -- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA -- Greedy Distinguishers and Nonrandomness Detectors -- Fast Cryptographic Computation -- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity -- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication -- Cryptanalysis of AES -- Attack on a Higher-Order Masking of the AES Based on Homographic Functions -- Improved Impossible Differential Cryptanalysis of 7-Round AES-128 -- Cryptanalysis of a Perturbated White-Box AES Implementation -- Efficient Implementation -- A Program Generator for Intel AES-NI Instructions -- ECC2K-130 on NVIDIA GPUs -- One Byte per Clock: A Novel RC4 Hardware. | |
| 546 | _aEnglish. | ||
| 650 | 0 |
_aCryptography _vCongresses. _914592 |
|
| 650 | 0 |
_aComputer security. _92191 |
|
| 650 | 2 |
_aSoftware _916724 |
|
| 650 | 2 |
_aComputer Security _92191 |
|
| 650 | 6 |
_aCryptographie _vCongrès. _914593 |
|
| 650 | 6 |
_aLogiciels. _926065 |
|
| 650 | 6 |
_aSécurité informatique. _918600 |
|
| 650 | 7 |
_asoftware. _2aat _916724 |
|
| 650 | 0 | 7 |
_aCryptography. _2cct |
| 650 | 7 |
_aInformatique. _2eclas _914930 |
|
| 650 | 7 |
_aCryptography _2fast |
|
| 655 | 2 |
_aCongress _911670 |
|
| 655 | 7 |
_aproceedings (reports) _2aat |
|
| 655 | 7 |
_aConference papers and proceedings _2fast _96065 |
|
| 655 | 7 |
_aConference papers and proceedings. _2lcgft _96065 |
|
| 655 | 7 |
_aActes de congrès. _2rvmgf _9609890 |
|
| 700 | 1 |
_aGong, Guang, _d1956- _1https://id.oclc.org/worldcat/entity/E39PCjDBYy7YkCD4G7RCMFtTxP _929949 |
|
| 700 | 1 |
_aGupta, Kishan Chand. _941240 |
|
| 758 |
_ihas work: _aProgress in cryptology-DOCRYPT 2010 (Text) _1https://id.oclc.org/worldcat/entity/E39PCGd9XDydQbrrHRXpMJjHmd _4https://id.oclc.org/worldcat/ontology/hasWork |
||
| 773 | 0 | _tSpringer eBooks | |
| 776 | 0 | 8 |
_iPrint version: _tProgress in cryptology - INDOCRYPT 2010. _dBerlin : Springer, 2010 _z9783642174001 _w(OCoLC)688494820 |
| 830 | 0 |
_aLecture notes in computer science ; _v6498. _x0302-9743 |
|
| 830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. _920708 |
|
| 856 | 4 | 0 | _uhttps://link.springer.com/10.1007/978-3-642-17401-8 |
| 938 |
_aProQuest Ebook Central _bEBLB _nEBL3066228 |
||
| 938 |
_aebrary _bEBRY _nebr10435097 |
||
| 938 |
_aYBP Library Services _bYANK _n3586263 |
||
| 994 |
_a92 _bATIST |
||
| 999 |
_c640691 _d640691 |
||