000 | 03456nam a22003495i 4500 | ||
---|---|---|---|
001 | 316602 | ||
003 | MX-SnUAN | ||
005 | 20160429160946.0 | ||
007 | cr nn 008mamaa | ||
008 | 160108s2014 gw | s |||| 0|eng d | ||
020 |
_a9783319067346 _9978-3-319-06734-6 |
||
035 | _avtls000417199 | ||
039 | 9 |
_y201601081129 _zstaff |
|
050 | 4 | _aQA76.9.A25 | |
245 | 1 | 0 |
_aProgress in cryptology – africacrypt 2014 : _b7th international conference on cryptology in africa, marrakesh, morocco, may 28-30, 2014. Proceedings / _cedited by David Pointcheval, Damien Vergnaud. |
264 | 1 |
_aCham : _bSpringer International Publishing : _bSpringer, _c2014. |
|
300 |
_axiv, 476 páginas : _b92 ilustraciones |
||
336 |
_atexto _btxt _2rdacontent |
||
337 |
_acomputadora _bc _2rdamedia |
||
338 |
_arecurso en línea _bcr _2rdacarrier |
||
347 |
_aarchivo de texto _bPDF _2rda |
||
490 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v8469 |
|
500 | _aSpringer eBooks | ||
505 | 0 | _aNew Results for Rank-Based Cryptography -- Public-Key Cryptography -- Proxy Re-Encryption Scheme Supporting a Selection of Delegatees -- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes -- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited -- Hash Functions -- Differential Biases in Reduced-Round Keccak -- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry -- Preimage Attacks on Reduced-Round Stribog -- Secret-Key Cryptanalysis -- Breaking the IOC Authenticated Encryption Mode -- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers -- Multidimensional Zero-Correlation Linear Cryptanalysis of E2 -- Public-Key Cryptanalysis and Number Theory Further Improvement of Factoring RSA Moduli with Implicit Hint -- New Attacks on the RSA Cryptosystem -- Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic Nets -- Hardware Implementation -- New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers -- Minimizing S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing – A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum -- Position-Based Cryptography from Noisy Channels -- Lattice-Based Cryptography -- A Comparison of the Homomorphic Encryption Schemes FV and YASHE -- Towards Lattice Based Aggregate Signatures -- Public-Key Cryptography -- A Second Look at Fischlin’s Transformation -- Anonymous IBE from Quadratic Residuosity with Improved Performance -- Expressive Attribute Based Signcryption with Constant-Size Ciphertext -- Secret-Key Cryptography.-DRECON: DPA Resistant Encryption by Construction -- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions -- Universal Hash-Function Families: From Hashing to Authentication. | |
590 | _aPara consulta fuera de la UANL se requiere clave de acceso remoto. | ||
700 | 1 |
_aPointcheval, David, _eeditor. _9330419 |
|
700 | 1 |
_aVergnaud, Damien, _eeditor. _9336632 |
|
710 | 2 |
_aSpringerLink (Servicio en línea) _9299170 |
|
776 | 0 | 8 |
_iEdición impresa: _z9783319067339 |
856 | 4 | 0 |
_uhttp://remoto.dgb.uanl.mx/login?url=http://dx.doi.org/10.1007/978-3-319-06734-6 _zConectar a Springer E-Books (Para consulta externa se requiere previa autentificación en Biblioteca Digital UANL) |
942 | _c14 | ||
999 |
_c316602 _d316602 |