Security and Cryptography for Networks : 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings

This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on crypt...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Visconti Ivan (Directeur de publication), De Prisco Roberto (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Security and Cryptography for Networks : 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings / edited by Ivan Visconti, Roberto Prisco.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2012
Cham : Springer Nature
Collection : Security and Cryptology ; 7485
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Sujets :
Documents associés : Autre format: Security and Cryptography for Networks
Autre format: Security and Cryptography for Networks
LEADER 05348clm a2200673 4500
001 PPN168323095
003 http://www.sudoc.fr/168323095
005 20241001155100.0
010 |a 978-3-642-32928-9 
017 7 0 |a 10.1007/978-3-642-32928-9  |2 DOI 
035 |a (OCoLC)818323695 
035 |a Springer978-3-642-32928-9 
035 |a Springer-11645-978-3-642-32928-9 
100 |a 20130325d2012 u u0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
105 |a y z 100yy 
106 |a s 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Security and Cryptography for Networks  |e 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings  |f edited by Ivan Visconti, Roberto Prisco. 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2012 
225 0 |a Security and Cryptology  |x 2946-1863  |v 7485 
330 |a This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners. 
359 1 |a Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and 2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of -Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance andPre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. 
371 0 |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition 
410 | |t Security and Cryptology  |x 2946-1863  |v 7485 
452 | |t Security and Cryptography for Networks  |y 9783642329272 
452 | |t Security and Cryptography for Networks  |b Texte imprimé  |y 9783642329296 
608 |3 PPN02886431X  |a Actes de congrès  |2 rameau 
610 1 |a Computer Science 
610 2 |a Data Encryption 
610 2 |a Systems and Data Security 
610 2 |a Management of Computing and Information Systems 
610 2 |a Computer Appl. in Administrative Data Processing 
610 2 |a Computer Communication Networks 
610 1 |a Cryptology. 
610 2 |a Data and Information Security 
610 2 |a IT Operations 
610 2 |a Computer Application in Administrative Data Processing 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 005.82  |v 23 
680 |a QA76.9.A25 
700 1 |3 PPN128007613  |a Visconti  |b Ivan  |4 651 
701 1 |a Visconti  |b Ivan  |4 651 
701 1 |a De Prisco  |b Roberto  |4 651 
801 3 |a FR  |b Abes  |c 20240611  |g AFNOR 
801 1 |a DE  |b Springer  |c 20240603  |g AACR2 
856 4 |5 441099901:83085410X  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-32928-9 
915 |5 441099901:83085410X  |b SPRING13-00471 
930 |5 441099901:83085410X  |b 441099901  |j g 
991 |5 441099901:83085410X  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:11 
997 |a NUM  |b SPRING13-00471  |d NUMpivo  |e EM  |s d 
998 |a 978303