Topics in cryptology CT-RSA 2013 : The Cryptographers Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into...
Enregistré dans:
Auteur principal : | |
---|---|
Format : | Livre |
Langue : | anglais |
Titre complet : | Topics in cryptology CT-RSA 2013 : The Cryptographers Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings / edited by Ed Dawson |
Publié : |
Berlin, Heidelberg :
Springer Berlin Heidelberg
, 2013 Cham : Springer Nature |
Collection : | Security and Cryptology ; 7779 |
Accès en ligne : |
Accès Nantes Université
Accès direct soit depuis les campus via le réseau ou le wifi eduroam soit à distance avec un compte @etu.univ-nantes.fr ou @univ-nantes.fr |
Note sur l'URL : | Accès sur la plateforme de l'éditeur Accès sur la plateforme Istex |
Condition d'utilisation et de reproduction : | Conditions particulières de réutilisation pour les bénéficiaires des licences nationales : chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 |
Sujets : | |
Documents associés : | Autre format:
Topics in Cryptology CT-RSA 2013 Autre format: Topics in Cryptology - CT- RSA 2013 |
LEADER | 05582clm a2200685 4500 | ||
---|---|---|---|
001 | PPN168329751 | ||
003 | http://www.sudoc.fr/168329751 | ||
005 | 20241001155200.0 | ||
010 | |a 978-3-642-36095-4 | ||
017 | 7 | 0 | |a 10.1007/978-3-642-36095-4 |2 DOI |
035 | |a (OCoLC)829434089 | ||
035 | |a Springer978-3-642-36095-4 | ||
035 | |a SPRINGER_EBOOKS_LN_PLURI_10.1007/978-3-642-36095-4 | ||
035 | |a Springer-11645-978-3-642-36095-4 | ||
100 | |a 20130325d2013 u u0frey0103 ba | ||
101 | 0 | |a eng |2 639-2 | |
102 | |a DE | ||
135 | |a dr||||||||||| | ||
181 | |6 z01 |c txt |2 rdacontent | ||
181 | 1 | |6 z01 |a i# |b xxxe## | |
182 | |6 z01 |c c |2 rdamedia | ||
182 | 1 | |6 z01 |a b | |
183 | |6 z01 |a ceb |2 RDAfrCarrier | ||
200 | 1 | |a Topics in cryptology CT-RSA 2013 |e The Cryptographers Track at the RSA Conference 2013, San Francisco,CA, USA, February 25-March 1, 2013. Proceedings |f edited by Ed Dawson | |
214 | 0 | |a Berlin, Heidelberg |c Springer Berlin Heidelberg | |
214 | 2 | |a Cham |c Springer Nature |d 2013 | |
225 | 0 | |a Security and Cryptology |x 2946-1863 |v 7779 | |
330 | |a This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption. | ||
359 | 1 | |a Side Channel Attacks I -- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL -- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party -- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures -- Public-Key Encryption I -- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption -- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks -- Cryptographic Protocols I -- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes -- Randomized Partial Checking Revisited -- Secure Implementation Methods -- Randomly Failed! The State of Randomness in Current Java Implementations -- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl -- Symmetric Key Primitives I -- Collisions for the WIDEA-8 Compression Function -- Finding Collisions for Round-Reduced SM3 -- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures -- Side Channel Attacks II -- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag -- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness -- Cryptographic Protocols II -- Cryptanalytic Attacks on MIFARE Classic Protocol -- Asynchronous Computational VSS with Reduced Communication Complexity -- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012 -- Solving BDD by Enumeration: An Update -- Identity-Based Encryption -- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions -- Accountable Authority Identity-Based Encryption with Public Traceability -- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption -- Symmetric Key Primitives II -- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users -- A FullyHomomorphic Cryptosystem with Approximate Perfect Secrecy -- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis. | |
371 | 0 | |a Accès en ligne pour les établissements français bénéficiaires des licences nationales | |
371 | 0 | |a Accès soumis à abonnement pour tout autre établissement | |
371 | 1 | |a Conditions particulières de réutilisation pour les bénéficiaires des licences nationales |c chttps://www.licencesnationales.fr/springer-nature-ebooks-contrat-licence-ln-2017 | |
410 | | | |t Security and Cryptology |x 2946-1863 |v 7779 | |
452 | | | |t Topics in Cryptology CT-RSA 2013 |b Texte imprimé |y 9783642360947 | |
452 | | | |t Topics in Cryptology - CT- RSA 2013 |b Texte imprimé |y 9783642360961 | |
610 | 1 | |a Computer Science | |
610 | 2 | |a Data Encryption | |
610 | 2 | |a Systems and Data Security | |
610 | 2 | |a e-Commerce/e-business | |
610 | 2 | |a Operating Systems | |
610 | 2 | |a Computer Communication Networks | |
610 | 2 | |a Coding and Information Theory | |
610 | 1 | |a Cryptology. | |
610 | 2 | |a Data and Information Security | |
610 | 2 | |a e-Commerce and e-Business | |
615 | |a @Computer Science |n 11645 |2 Springer | ||
676 | |a 005.82 |v 23 | ||
680 | |a QA76.9.A25 | ||
700 | 1 | |a Dawson |b Ed |4 651 | |
701 | 1 | |a Dawson |b Ed |4 651 | |
801 | 3 | |a FR |b Abes |c 20240814 |g AFNOR | |
801 | 1 | |a DE |b Springer |c 20240603 |g AACR2 | |
856 | 4 | |q PDF |u https://doi.org/10.1007/978-3-642-36095-4 |z Accès sur la plateforme de l'éditeur | |
856 | 4 | |u https://revue-sommaire.istex.fr/ark:/67375/8Q1-9CGPML2F-6 |z Accès sur la plateforme Istex | |
856 | 4 | |5 441099901:830857206 |u https://budistant.univ-nantes.fr/login?url=https://doi.org/10.1007/978-3-642-36095-4 | |
915 | |5 441099901:830857206 |b SPRING13-00745 | ||
930 | |5 441099901:830857206 |b 441099901 |j g | ||
991 | |5 441099901:830857206 |a Exemplaire créé en masse par ITEM le 30-09-2024 16:13 | ||
997 | |a NUM |b SPRING13-00745 |d NUMpivo |e EM |s d | ||
998 | |a 978575 |