Loading…

Progress in Cryptology - INDOCRYPT 2009 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings /

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections o...

Full description

Bibliographic Details
Call Number:Libro Electrónico
Corporate Author: SpringerLink (Online service)
Other Authors: Roy, Bimal Kumar (Editor), Sendrier, Nicolas (Editor)
Format: Electronic eBook
Language:Inglés
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2009.
Edition:1st ed. 2009.
Series:Security and Cryptology ; 5922
Subjects:
Online Access:Texto Completo

MARC

LEADER 00000nam a22000005i 4500
001 978-3-642-10628-6
003 DE-He213
005 20220114193717.0
007 cr nn 008mamaa
008 100301s2009 gw | s |||| 0|eng d
020 |a 9783642106286  |9 978-3-642-10628-6 
024 7 |a 10.1007/978-3-642-10628-6  |2 doi 
050 4 |a QA268 
072 7 |a GPJ  |2 bicssc 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 thema 
072 7 |a URY  |2 thema 
082 0 4 |a 005.824  |2 23 
245 1 0 |a Progress in Cryptology - INDOCRYPT 2009  |h [electronic resource] :  |b 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings /  |c edited by Bimal Kumar Roy, Nicolas Sendrier. 
250 |a 1st ed. 2009. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2009. 
300 |a XV, 443 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Security and Cryptology ;  |v 5922 
505 0 |a Post-Quantum Cryptology -- Secure Parameters for SWIFFT -- FSBday -- Key Agreement Protocols -- Reusing Static Keys in Key Agreement Protocols -- A Study of Two-Party Certificateless Authenticated Key-Agreement Protocols -- Side Channel Attacks -- Fault Analysis of Rabbit: Toward a Secret Key Leakage -- On Physical Obfuscation of Cryptographic Algorithms -- Cache Timing Attacks on Clefia -- Symmetric Cryptology -- Software Oriented Stream Ciphers Based upon FCSRs in Diversified Mode -- On the Symmetric Negabent Boolean Functions -- Improved Meet-in-the-Middle Attacks on AES -- Hash Functions -- Related-Key Rectangle Attack of the Full HAS-160 Encryption Mode -- Second Preimage Attack on SHAMATA-512 -- Towards Secure and Practical MACs for Body Sensor Networks -- Indifferentiability Characterization of Hash Functions and Optimal Bounds of Popular Domain Extensions -- A Distinguisher for the Compression Function of SIMD-512 -- Number Theoretic Cryptology -- Sampling from Signed Quadratic Residues: RSA Group Is Pseudofree -- Software Implementation of Pairing-Based Cryptography on Sensor Networks Using the MSP430 Microcontroller -- A New Hard-Core Predicate of Paillier's Trapdoor Function -- Lightweight Cryptology -- Private Interrogation of Devices via Identification Codes -- RFID Distance Bounding Multistate Enhancement -- Two Attacks against the F f RFID Protocol -- Signature Protocols -- Efficient Constructions of Signcryption Schemes and Signcryption Composability -- On Generic Constructions of Designated Confirmer Signatures -- Verifiably Encrypted Signatures from RSA without NIZKs -- Identity Based Aggregate Signcryption Schemes -- Multiparty Computation -- Round Efficient Unconditionally Secure MPC and Multiparty Set Intersection with Optimal Resilience -- Non-committing Encryptions Based on Oblivious Naor-Pinkas Cryptosystems -- Oblivious Multi-variate Polynomial Evaluation. 
520 |a This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009. The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation. 
650 0 |a Cryptography. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer networks . 
650 0 |a Data structures (Computer science). 
650 0 |a Information theory. 
650 0 |a Data protection. 
650 0 |a Coding theory. 
650 0 |a Machine theory. 
650 1 4 |a Cryptology. 
650 2 4 |a Computer Communication Networks. 
650 2 4 |a Data Structures and Information Theory. 
650 2 4 |a Data and Information Security. 
650 2 4 |a Coding and Information Theory. 
650 2 4 |a Formal Languages and Automata Theory. 
700 1 |a Roy, Bimal Kumar.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Sendrier, Nicolas.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer Nature eBook 
776 0 8 |i Printed edition:  |z 9783642106293 
776 0 8 |i Printed edition:  |z 9783642106279 
830 0 |a Security and Cryptology ;  |v 5922 
856 4 0 |u https://doi.uam.elogim.com/10.1007/978-3-642-10628-6  |z Texto Completo 
912 |a ZDB-2-SCS 
912 |a ZDB-2-SXCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (SpringerNature-11645) 
950 |a Computer Science (R0) (SpringerNature-43710)