Security and Cryptography for Networks (eBook, PDF)
8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings
Redaktion: Visconti, Ivan; De Prisco, Roberto
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Security and Cryptography for Networks (eBook, PDF)
8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012, Proceedings
Redaktion: Visconti, Ivan; De Prisco, Roberto
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.73MB
Andere Kunden interessierten sich auch für
- Advances in Cryptology - CRYPTO 2016 (eBook, PDF)40,95 €
- Advances in Cryptology - CRYPTO 2016 (eBook, PDF)40,95 €
- Advances in Cryptology - CRYPTO 2016 (eBook, PDF)40,95 €
- Theory of Cryptography (eBook, PDF)73,95 €
- Provable Security (eBook, PDF)40,95 €
- Provable Security (eBook, PDF)40,95 €
- Theory of Cryptography (eBook, PDF)73,95 €
-
-
-
This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012.
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 582
- Erscheinungstermin: 30. August 2012
- Englisch
- ISBN-13: 9783642329289
- Artikelnr.: 43859939
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 582
- Erscheinungstermin: 30. August 2012
- Englisch
- ISBN-13: 9783642329289
- Artikelnr.: 43859939
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Deterministic Public Key Encryption and Identity-Based Encryptionfrom Lattices in the Auxiliary-Input Setting.- Ring Switching in BGV-Style Homomorphic Encryption.- Zero-Knowledge Proofs with Low Amortized Communication fromLattice Assumptions.- Fully Anonymous Attribute Tokens from Lattices.- Efficient Structure-Preserving Signature Scheme from StandardAssumptions.- Compact Round-Optimal Partially-Blind Signatures.- History-Free Sequential Aggregate Signatures.- A New Hash-and-Sign Approach and Structure-Preserving Signaturesfrom DLIN.- Blackbox Construction of a More Than Non-Malleable CCA1Encryption Scheme from Plaintext Awareness.- Decentralized Dynamic Broadcast Encryption.- Time-Specific Encryption from Forward-Secure Encryption.- Efficient Two-Party and Multi-Party ComputationImproved Secure Two-Party Computation via Information-TheoreticGarbled Circuits.- 5PM: Secure Pattern Matching.- Implementing AES via an Actively/Covertly Secure Dishonest-MajorityMPC Protocol.- On the Centrality of Off-Line E-Cash to Concrete Partial InformationGames.- Universally Composable Security with Local Adversaries.- On the Strength Comparison of the ECDLP and the IFP.- New Attacks for Knapsack Based Cryptosystems.- Multiple Differential Cryptanalysis Using LLR and 2 Statistics.- Quo Vadis Quaternion? Cryptanalysis of Rainbow overNon-commutative Rings.- Homomorphic Encryption for Multiplications and Pairing Evaluation.- Publicly Verifiable Ciphertexts.- Public-Key Encryption with Lazy Parties.- Probabilistically Correct Secure Arithmetic Computation for ModularConversion, Zero Test, Comparison, MOD and Exponentiation.- MAC Aggregation with Message Multiplicity.- Efficiency Limitations of Sigma-Protocols for Group HomomorphismsRevisited.- A More Efficient Computationally Sound Non-InteractiveZero-Knowledge Shuffle Argument.- Active Security in Multiparty Computation over Black-Box Groups.- Hash Combiners for Second Pre-image Resistance, Target CollisionResistance andPre-image Resistance Have Long Output.- Human Perfectly Secure Message Transmission Protocols and TheirApplications.- Oblivious Transfer with Hidden Access Control from Attribute-BasedEncryption.
Deterministic Public Key Encryption and Identity-Based Encryptionfrom Lattices in the Auxiliary-Input Setting.- Ring Switching in BGV-Style Homomorphic Encryption.- Zero-Knowledge Proofs with Low Amortized Communication fromLattice Assumptions.- Fully Anonymous Attribute Tokens from Lattices.- Efficient Structure-Preserving Signature Scheme from StandardAssumptions.- Compact Round-Optimal Partially-Blind Signatures.- History-Free Sequential Aggregate Signatures.- A New Hash-and-Sign Approach and Structure-Preserving Signaturesfrom DLIN.- Blackbox Construction of a More Than Non-Malleable CCA1Encryption Scheme from Plaintext Awareness.- Decentralized Dynamic Broadcast Encryption.- Time-Specific Encryption from Forward-Secure Encryption.- Efficient Two-Party and Multi-Party ComputationImproved Secure Two-Party Computation via Information-TheoreticGarbled Circuits.- 5PM: Secure Pattern Matching.- Implementing AES via an Actively/Covertly Secure Dishonest-MajorityMPC Protocol.- On the Centrality of Off-Line E-Cash to Concrete Partial InformationGames.- Universally Composable Security with Local Adversaries.- On the Strength Comparison of the ECDLP and the IFP.- New Attacks for Knapsack Based Cryptosystems.- Multiple Differential Cryptanalysis Using LLR and 2 Statistics.- Quo Vadis Quaternion? Cryptanalysis of Rainbow overNon-commutative Rings.- Homomorphic Encryption for Multiplications and Pairing Evaluation.- Publicly Verifiable Ciphertexts.- Public-Key Encryption with Lazy Parties.- Probabilistically Correct Secure Arithmetic Computation for ModularConversion, Zero Test, Comparison, MOD and Exponentiation.- MAC Aggregation with Message Multiplicity.- Efficiency Limitations of Sigma-Protocols for Group HomomorphismsRevisited.- A More Efficient Computationally Sound Non-InteractiveZero-Knowledge Shuffle Argument.- Active Security in Multiparty Computation over Black-Box Groups.- Hash Combiners for Second Pre-image Resistance, Target CollisionResistance andPre-image Resistance Have Long Output.- Human Perfectly Secure Message Transmission Protocols and TheirApplications.- Oblivious Transfer with Hidden Access Control from Attribute-BasedEncryption.