Selected Areas in Cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are org...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Knudsen Lars R. (Directeur de publication), Wu Huapeng (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Selected Areas in Cryptography : 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers / edited by Lars R. Knudsen, Huapeng Wu.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2013
Cham : Springer Nature
Collection : Security and Cryptology ; 7707
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Note sur l'URL : Accès sur la plateforme de l'éditeur
Accès sur la plateforme Istex
Condition d'utilisation et de reproduction : Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017
Sujets :
Documents associés : Autre format: Selected Areas in Cryptography
Autre format: Selected Areas in Cryptography
LEADER 05372clm a2200685 4500
001 PPN168329603
003 http://www.sudoc.fr/168329603
005 20241001155200.0
010 |a 978-3-642-35999-6 
017 7 0 |a 10.1007/978-3-642-35999-6  |2 DOI 
035 |a (OCoLC)829434050 
035 |a Springer978-3-642-35999-6 
035 |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-35999-6 
035 |a Springer-11645-978-3-642-35999-6 
100 |a 20130325d2013 u u0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Selected Areas in Cryptography  |e 19th International Conference, SAC 2012, Windsor, ON, Canada, August 15-16, 2012, Revised Selected Papers  |f edited by Lars R. Knudsen, Huapeng Wu. 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2013 
225 0 |a Security and Cryptology  |x 2946-1863  |v 7707 
330 |a This book constitutes the thoroughly refereed post-conference proceedings of the 19th International Conference on Selected Areas in Cryptography, SAC 2012, held in Windsor, Ontario, Canada, in August 2012. The 24 papers presented were carefully reviewed and selected from 87 submissions. They are organized in topical sections named: cryptanalysis, digital signatures, stream ciphers, implementations, block cipher cryptanalysis, lattices, hashfunctions, blockcipher constructions, and miscellaneous. 
359 1 |a Cryptanalysis -- An All-In-One Approach to Differential Cryptanalysis for Small Block Ciphers -- A New Method for Solving Polynomial Systems with Noise over F2 and Its Applications in Cold Boot Key Recovery -- Cryptanalysis of the Xiao Lai White-Box AES Implementation -- Digital Signatures A Practical Leakage-Resilient Signature Scheme in the Generic Group Model -- Forward Secure Signatures on Smart Cards -- The Stafford Tavares Lecture Extracts from the SHA-3 Competition -- Stream Ciphers Cryptanalysis of the Kindle Cipher -- Cryptographically Strong de Bruijn Sequences with Large Periods -- Cryptanalysis of the Loiss Stream Cipher -- Implementations -- Efficient Arithmetic on Elliptic Curves over Fields of Characteristic Three -- Efficient Implementation of Bilinear Pairings on ARM Processors -- Towards Faster and Greener Cryptoprocessor for Eta Pairing on Supersingular Elliptic Curve over F21223 -- Feasibility and Practicability of Standardized Cryptography on 4-bit Micro Controllers -- Block Cipher Cryptanalysis -- All Subkeys Recovery Attack on Block Ciphers: Extending Meet-in-the-Middle Approach -- Improved Cryptanalysis of the Block Cipher KASUMI -- Meet-in-the-Middle Technique for Integral Attacks against Feistel Ciphers -- Attacking (EC)DSA Given Only an Implicit Hint -- Lattice Reduction for Modular Knapsack -- Hash Functions -- The Boomerang Attacks on the Round-Reduced Skein-512 -- Boomerang and Slide-Rotational Analysis of the SM3 Hash Function -- Provable Security of BLAKE with Non-ideal Compression Function -- Block Cipher Constructions TWINE: A Lightweight Block Cipher for Multiple Platforms -- Recursive Diffusion Layers for (Lightweight) Block Ciphers and Hash Functions -- Miscellaneous -- Private Stream Search at Almost the Same Communication Cost as a Regular Search -- An Optimal Key Enumeration Algorithm and Its Application to Side-Channel Attacks. 
371 0 |a Accès en ligne pour les établissements français bénéficiaires des licences nationales 
371 0 |a Accès soumis à abonnement pour tout autre établissement 
371 1 |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales  |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 
410 | |t Security and Cryptology  |x 2946-1863  |v 7707 
452 | |t Selected Areas in Cryptography  |b Texte imprimé  |y 9783642359989 
452 | |t Selected Areas in Cryptography  |b Texte imprimé  |y 9783642360008 
610 1 |a Computer Science 
610 2 |a Data Encryption 
610 2 |a Systems and Data Security 
610 2 |a Algorithm Analysis and Problem Complexity 
610 2 |a Information Systems Applications (incl. Internet) 
610 2 |a Computer Communication Networks 
610 1 |a Cryptology 
610 2 |a Algorithms 
610 2 |a Data and Information Security 
610 2 |a Computer and Information Systems Applications 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 005.82  |v 23 
680 |a QA76.9.A25 
700 1 |a Knudsen  |b Lars R.  |4 651 
701 1 |a Wu  |b Huapeng  |4 651 
801 3 |a FR  |b Abes  |c 20240814  |g AFNOR 
801 1 |a DE  |b Springer  |c 20240603  |g AACR2 
856 4 |q PDF  |u https://doi.org/10.1007/978-3-642-35999-6  |z Accès sur la plateforme de l'éditeur 
856 4 |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-ZL6VZDB6-D  |z Accès sur la plateforme Istex 
856 4 |5 441099901:830857079  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-35999-6 
915 |5 441099901:830857079  |b SPRING13-00734 
930 |5 441099901:830857079  |b 441099901  |j g 
991 |5 441099901:830857079  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:13 
997 |a NUM  |b SPRING13-00734  |d NUMpivo  |e EM  |s d 
998 |a 978564