Information Security and Cryptology : 7th International Conference, Inscrypt 2011, Beijing, China, November 30 December 3, 2011. Revised Selected Papers

This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully re...

Description complète

Enregistré dans:
Détails bibliographiques
Auteurs principaux : Wu Chuan-Kun (Directeur de publication), Yung Moti (Directeur de publication), Lin Dongdai (Directeur de publication)
Format : Livre
Langue : anglais
Titre complet : Information Security and Cryptology : 7th International Conference, Inscrypt 2011, Beijing, China, November 30 December 3, 2011. Revised Selected Papers / edited by Chuan-Kun Wu, Moti Yung, Dongdai Lin.
Publié : Berlin, Heidelberg : Springer Berlin Heidelberg , 2012
Cham : Springer Nature
Collection : Security and Cryptology ; 7537
Accès en ligne : Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr
Sujets :
Documents associés : Autre format: Information Security and Cryptology
Autre format: Information Security and Cryptology
LEADER 04806clm a2200673 4500
001 PPN168327406
003 http://www.sudoc.fr/168327406
005 20241001155200.0
010 |a 978-3-642-34704-7 
017 7 0 |a 10.1007/978-3-642-34704-7  |2 DOI 
035 |a (OCoLC)818324380 
035 |a Springer978-3-642-34704-7 
035 |a Springer-11645-978-3-642-34704-7 
100 |a 20130325d2012 u |0frey0103 ba 
101 0 |a eng  |2 639-2 
102 |a DE 
135 |a dr||||||||||| 
181 |6 z01  |c txt  |2 rdacontent 
181 1 |6 z01  |a i#  |b xxxe## 
182 |6 z01  |c c  |2 rdamedia 
182 1 |6 z01  |a b 
183 |6 z01  |a ceb  |2 RDAfrCarrier 
200 1 |a Information Security and Cryptology  |e 7th International Conference, Inscrypt 2011, Beijing, China, November 30 December 3, 2011. Revised Selected Papers  |f edited by Chuan-Kun Wu, Moti Yung, Dongdai Lin. 
214 0 |a Berlin, Heidelberg  |c Springer Berlin Heidelberg 
214 2 |a Cham  |c Springer Nature  |d 2012 
225 0 |a Security and Cryptology  |x 2946-1863  |v 7537 
330 |a This book constitutes the thoroughly refereed post-conference proceedings of the 7th International Conference on Information Security and Cryptology, Inscrypt 2011, held in Beijing, China, in November/December 2011. The 24 revised full papers presented together with 2 invited talks were carefully reviewed and selected from 80 submissions. The papers present research advances in the areas of information security, cryptology, and their applications. 
359 1 |a Adaptively Secure Forward-Secure Non-interactive Threshold Cryptosystems -- Cryptanalysis vs. Provable Security -- Boosting Scalability in Anomaly-Based Packed Executable Filtering -- Searching Short Recurrences of Nonlinear Shift Registers via Directed Acyclic Graphs -- Differential and Linear Cryptanalysis Using Mixed-Integer Linear Programming -- Adleman-Manders-Miller Root Extraction Method Revisited -- Multi-pixel Encryption Visual Cryptography -- An Improved Electronic Voting Scheme without a Trusted Random Number Generator -- Fault Attacks against the Miller Algorithm in Hessian Coordinates -- Benchmarking for Steganography by Kernel Fisher Discriminant Criterion -- Improved Tradeoff between Encapsulation and Decapsulation of HK09 -- Non-interactive Deniable Authentication Protocols -- On the Probability Distribution of the Carry Cells of Stream Ciphers F-FCSR-H v2 and F-FCSR-H v3 -- Efficient Self-certified Signatures with Batch Verification -- A Generic Construction from Selective-IBE to Public-Key Encryption with Non-interactive Opening -- Fast Tate Pairing Computation on Twisted Jacobi Intersections Curves -- Weak-Key Class of MISTY1 for Related-Key Differential Attack -- Cryptanalysis of Reduced-Round KLEIN Block Cipher -- An Efficient RSA Implementation without Precomputation -- The Stream Cipher Core of the 3GPP Encryption Standard 128-EEA3: Timing Attacks and Countermeasures -- Batching Multiple Protocols to Improve Efficiency of Multi-Party Computation -- Towards Attack Resilient Social Network Based Threshold Signing -- A Ciphertext Policy Attribute-Based Encryption Scheme without Pairings -- Cryptanalysis of Randomized Arithmetic Codes Based on Markov Model. 
371 0 |a L'accès complet à la ressource est réservé aux usagers des établissements qui en ont fait l'acquisition 
410 | |t Security and Cryptology  |x 2946-1863  |v 7537 
452 | |t Information Security and Cryptology  |b Texte imprimé  |y 9783642347030 
452 | |t Information Security and Cryptology  |b Texte imprimé  |y 9783642347054 
610 1 |a Computer Science 
610 2 |a Data Encryption 
610 2 |a Systems and Data Security 
610 2 |a Algorithm Analysis and Problem Complexity 
610 2 |a Computer Appl. in Administrative Data Processing 
610 2 |a e-Commerce/e-business 
610 2 |a Coding and Information Theory 
610 2 |a Cryptology. 
610 1 |a Data and Information Security 
610 2 |a Algorithms 
610 2 |a Computer Application in Administrative Data Processing 
610 2 |a e-Commerce and e-Business 
615 |a @Computer Science  |n 11645  |2 Springer 
676 |a 005.8  |v 23 
680 |a QA76.9.A25 
700 1 |a Wu  |b Chuan-Kun 
701 1 |a Wu  |b Chuan-Kun  |4 651 
701 1 |3 PPN074651536  |a Yung  |b Moti  |f 1959-....  |4 651 
701 1 |a Lin  |b Dongdai  |4 651 
801 3 |a FR  |b Abes  |c 20231204  |g AFNOR 
801 1 |a DE  |b Springer  |c 20231204  |g AACR2 
856 4 |5 441099901:830856099  |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-34704-7 
915 |5 441099901:830856099  |b SPRING13-00646 
930 |5 441099901:830856099  |b 441099901  |j g 
991 |5 441099901:830856099  |a Exemplaire créé en masse par ITEM le 30-09-2024 16:13 
997 |a NUM  |b SPRING13-00646  |d NUMpivo  |e EM  |s d 
998 |a 978478