Muutke küpsiste eelistusi

E-raamat: Advances in Cryptology - ASIACRYPT 2016: 22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4-8, 2016, Proceedings, Part I

Edited by , Edited by
  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 10031
  • Ilmumisaeg: 14-Nov-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662538876
  • Formaat - EPUB+DRM
  • Hind: 110,53 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: EPUB+DRM
  • Sari: Security and Cryptology 10031
  • Ilmumisaeg: 14-Nov-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662538876

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016.The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.

Mathematical Analysis.- AES and White-Box.- Hash Function; Randomness.- Authenticated Encryption.- Block Cipher.- SCA and Leakage Resilience.- Zero Knowledge.- Post Quantum Cryptography.- Provable Security.- Digital Signature.- Functional and Homomorphic Cryptography.- ABE and IBE.- Foundation.- Cryptographic Protocol.- Multi-Party Computation.
Asiacrypt 2016 Best Paper
Faster Fully Homomorphic Encryption: Bootstrapping in Less Than 0.1 Seconds
3(34)
Ilaria Chillotti
Nicolas Gama
Mariya Georgieva
Malika Izabachene
Mathematical Analysis I
A General Polynomial Selection Method and New Asymptotic Complexities for the Tower Number Field Sieve Algorithm
37(26)
Palash Sarkar
Shashank Singh
On the Security of Supersingular Isogeny Cryptosystems
63(32)
Steven D. Galbraith
Christophe Petit
Barak Shani
Yan Bo Ti
AES and White-Box
Simpira v2: A Family of Efficient Permutations Using the AES Round Function
95(31)
Shay Gueron
Nicky Mouha
Towards Practical Whitebox Cryptography: Optimizing Efficiency and Space Hardness
126(33)
Andrey Bogdanov
Takanori Isobe
Elmar Tischhauser
Efficient and Provable White-Box Primitives
159(32)
Pierre-Alain Fouque
Pierre Karpman
Paul Kirchner
Brice Minaud
Hash Function
MiMC: Efficient Encryption and Cryptographic Hashing with Minimal Multiplicative Complexity
191(29)
Martin Albrecht
Lorenzo Grassi
Christian Rechberger
Arnab Roy
Tyge Tiessen
Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks
220(29)
Dan Boneh
Henry Corrigan-Gibbs
Stuart Schechter
Linear Structures: Applications to Cryptanalysis of Round-Reduced Keccak
249(28)
Jian Guo
Meicheng Liu
Ling Song
Randomness
When Are Fuzzy Extractors Possible?
277(30)
Benjamin Fuller
Leonid Reyzin
Adam Smith
More Powerful and Reliable Second-Level Statistical Randomness Tests for NIST SP 800-22
307(26)
Shuangyi Zhu
Yuan Ma
Jingqiang Lin
Jia Zhuang
Jiwu Jing
Authenticated Encryption
Trick or Tweak: On the (In)security of OTR's Tweaks
333(21)
Raphael Bost
Olivier Sanders
Universal Forgery and Key Recovery Attacks on ELmD Authenticated Encryption Algorithm
354(15)
Asli Bay
Oguzhan Ersoy
Ferhat Karakoc
Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
369(27)
Christoph Dobraunig
Maria Eichlseder
Thomas Korak
Victor Lomne
Florian Mendel
Authenticated Encryption with Variable Stretch
396(33)
Reza Reyhanitabar
Serge Vaudenay
Damian Vizar
Block Cipher I
Salvaging Weak Security Bounds for Blockcipher-Based Constructions
429(26)
Thomas Shrimpton
R. Seth Terashima
How to Build Fully Secure Tweakable Blockciphers from Classical Blockciphers
455(29)
Lei Wang
Jian Guo
Guoyan Zhang
Jingyuan Zhao
Dawu Gu
Design Strategies for ARX with Provable Bounds: Sparx and LAX
484(33)
Daniel Dinu
Leo Perrin
Aleksei Udovenko
Vesselin Velichkov
Johann Großschadl
Alex Biryukov
SCA and Leakage Resilience I
Side-Channel Analysis Protection and Low-Latency in Action: -- Case Study of PRINCE and Midori
517(31)
Amir Moradi
Tobias Schneider
Characterisation and Estimation of the Key Rank Distribution in the Context of Side Channel Evaluations
548(25)
Daniel P. Martin
Luke Mather
Elisabeth Oswald
Martijn Stam
Taylor Expansion of Maximum Likelihood Attacks for Masked and Shuffled Implementations
573(29)
Nicolas Bruneau
Sylvain Guilley
Annelie Heuser
Olivier Rioul
Francois-Xavier Standaert
Yannick Teglia
Unknown-Input Attacks in the Parallel Setting: Improving the Security of the CHES 2012 Leakage-Resilient PRF
602(25)
Marcel Medwed
Francois-Xavier Standaert
Ventzislav Nikov
Martin Feldhofer
Block Cipher II
A New Algorithm for the Unbalanced Meet-in-the-Middle Problem
627(21)
Ivica Nikolic
Yu Sasaki
Applying MILP Method to Searching Integral Distinguishers Based on Division Property for 6 Lightweight Block Ciphers
648(31)
Zejun Xiang
Wentao Zhang
Zhenzhen Bao
Dongdai Lin
Reverse Cycle Walking and Its Applications
679(24)
Sarah Miracle
Scott Yilek
Mathematical Analysis II
Optimization of LPN Solving Algorithms
703(26)
Sonia Bogos
Serge Vaudenay
The Kernel Matrix Diffie-Hellman Assumption
729(30)
Paz Morillo
Carla Rafols
Jorge L. Villar
Cryptographic Applications of Capacity Theory: On the Optimality of Coppersmith's Method for Univariate Polynomials
759(30)
Ted Chinburg
Brett Hemenway
Nadia Heninger
Zachary Scherr
A Key Recovery Attack on MDPC with CCA Security Using Decoding Errors
789(30)
Qian Guo
Thomas Johansson
Paul Stankovski
SCA and Leakage Resilience II
A Tale of Two Shares: Why Two-Share Threshold Implementation Seems Worthwhile---and Why It Is Not
819(25)
Cong Chen
Mohammad Farmani
Thomas Eisenbarth
Cryptographic Reverse Firewall via Malleable Smooth Projective Hash Functions
844(33)
Rongmao Chen
Yi Mu
Guomin Yang
Willy Susilo
Fuchun Guo
Mingwu Zhang
Efficient Public-Key Cryptography with Bounded Leakage and Tamper Resilience
877(31)
Antonio Faonio
Daniele Venturi
Public-Key Cryptosystems Resilient to Continuous Tampering and Leakage of Arbitrary Functions
908(31)
Eiichiro Fujisaki
Keita Xagawa
Author Index 939