Topics in cryptology CT-RSA 2013 : The Cryptographers Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings

This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into...

Description complète

Enregistré dans:
Détails bibliographiques
Auteur principal : Dawson Ed (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Topics in cryptology CT-RSA 2013 : The Cryptographers Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings / edited by Ed Dawson
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2013
Cham : Springer Nature
Collection : Security and Cryptology ; 7779
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Note sur l'URL : Accès sur la plateforme de l'éditeur
Accès sur la plateforme Istex
Condition d'utilisation et de reproduction : Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017
Sujets :
Documents associés : Autre format: Topics in Cryptology CT-RSA 2013
Autre format: Topics in Cryptology - CT- RSA 2013
LEADER 05582clm a2200685 4500
001 PPN168329751
003 http://www.sudoc.fr/168329751
005 20241001155200.0
010 |a 978-3-642-36095-4 
017 7 0 |a 10.1007/978-3-642-36095-4  |2 DOI 
035 |a (OCoLC)829434089 
035 |a Springer978-3-642-36095-4 
035 |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-36095-4 
035 |a Springer-11645-978-3-642-36095-4 
100 |a 20130325d2013 u u0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Topics in cryptology CT-RSA 2013  |e The Cryptographers Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings  |f edited by Ed Dawson 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2013 
225 0 |a Security and Cryptology  |x 2946-1863  |v 7779 
330 |a This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption. 
359 1 |a Side Channel Attacks I -- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL -- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party -- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures -- Public-Key Encryption I -- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption -- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes -- Randomized Partial Checking Revisited -- Secure Implementation Methods -- Randomly Failed! The State of Randomness in Current Java Implementations -- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl -- Symmetric Key Primitives I -- Collisions for the WIDEA-8 Compression Function -- Finding Collisions for Round-Reduced SM3 -- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures -- Side Channel Attacks II -- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag -- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness -- Cryptographic Protocols II -- Cryptanalytic Attacks on MIFARE Classic Protocol -- Asynchronous Computational VSS with Reduced Communication Complexity -- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 -- Solving BDD by Enumeration: An Update -- Identity-Based Encryption -- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions -- Accountable Authority Identity-Based Encryption with Public Traceability -- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption -- Symmetric Key Primitives II -- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users -- A FullyHomomorphic Cryptosystem with Approximate Perfect Secrecy -- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. 
371 0 |a Accès en ligne pour les établissements français bénéficiaires des licences nationales 
371 0 |a Accès soumis à abonnement pour tout autre établissement 
371 1 |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales  |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 
410 | |t Security and Cryptology  |x 2946-1863  |v 7779 
452 | |t Topics in Cryptology CT-RSA 2013  |b Texte imprimé  |y 9783642360947 
452 | |t Topics in Cryptology - CT- RSA 2013  |b Texte imprimé  |y 9783642360961 
610 1 |a Computer Science 
610 2 |a Data Encryption 
610 2 |a Systems and Data Security 
610 2 |a e-Commerce/e-business 
610 2 |a Operating Systems 
610 2 |a Computer Communication Networks 
610 2 |a Coding and Information Theory 
610 1 |a Cryptology. 
610 2 |a Data and Information Security 
610 2 |a e-Commerce and e-Business 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 005.82  |v 23 
680 |a QA76.9.A25 
700 1 |a Dawson  |b Ed  |4 651 
701 1 |a Dawson  |b Ed  |4 651 
801 3 |a FR  |b Abes  |c 20240814  |g AFNOR 
801 1 |a DE  |b Springer  |c 20240603  |g AACR2 
856 4 |q PDF  |u https://doi.org/10.1007/978-3-642-36095-4  |z Accès sur la plateforme de l'éditeur 
856 4 |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-9CGPML2F-6  |z Accès sur la plateforme Istex 
856 4 |5 441099901:830857206  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-36095-4 
915 |5 441099901:830857206  |b SPRING13-00745 
930 |5 441099901:830857206  |b 441099901  |j g 
991 |5 441099901:830857206  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:13 
997 |a NUM  |b SPRING13-00745  |d NUMpivo  |e EM  |s d 
998 |a 978575