Muutke küpsiste eelistusi

E-raamat: Advances in Cryptology - CRYPTO 2016: 36th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 14-18, 2016, Proceedings, Part I

Edited by , Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 9814
  • Ilmumisaeg: 25-Jul-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662530184
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 9814
  • Ilmumisaeg: 25-Jul-2016
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783662530184

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The three volume-set, LNCS 9814, LNCS 9815, and LNCS 9816, constitutes the refereed proceedings of the 36th Annual International Cryptology Conference, CRYPTO 2016, held in Santa Barbara, CA, USA, in August 2016.The 70 revised full papers presented were carefully reviewed and selected from 274 submissions. The papers are organized in the following topical sections: provable security for symmetric cryptography; asymmetric cryptography and cryptanalysis; cryptography in theory and practice; compromised systems; symmetric cryptanalysis; algorithmic number theory; symmetric primitives; asymmetric cryptography; symmetric cryptography; cryptanalytic tools; hardware-oriented cryptography; secure computation and protocols; obfuscation; quantum techniques; spooky encryption; IBE, ABE, and functional encryption; automated tools and synthesis; zero knowledge; theory.

Provable security for symmetric cryptography.- Asymmetric cryptography and cryptanalysis.- Cryptography in theory and practice.- Compromised systems.- Symmetric cryptanalysis.- Algorithmic number theory.- Symmetric primitives.- Asymmetric cryptography.- Symmetric cryptography.- Cryptanalytic tools.- Hardware-oriented cryptography.- Secure computation and protocols.- Obfuscation.- Quantum techniques.- Spooky encryption.- IBE, ABE, and functional encryption.- Automated tools and synthesis.- Zero knowledge.- Theory.
Provable Security for Symmetric Cryptography
Key-Alternating Ciphers and Key-Length Extension: Exact Bounds and Multi-user Security
3(30)
Viet Tung Hoang
Stefano Tessaro
Counter-in-Tweak: Authenticated Encryption Modes for Tweakable Block Ciphers
33(31)
Thomas Peyrin
Yannick Seurin
XPX: Generalized Tweakable Even-Mansour with Improved Security Guarantees
64(31)
Bart Mennink
Indifferentiability of 8-Round Feistel Networks
95(26)
Yuanxi Dai
John Steinberger
EWCDM: An Efficient, Beyond-Birthday Secure, Nonce-Misuse Resistant MAC
121(32)
Benoit Cogliati
Yannick Seurin
Asymmetric Cryptography and Cryptanalysis I
A Subfield Lattice Attack on Overstretched NTRU Assumptions: Cryptanalysis of Some FHE and Graded Encoding Schemes
153(26)
Martin Albrecht
Shi Bai
Leo Ducas
A Practical Cryptanalysis of the Algebraic Eraser
179(11)
Adi Ben-Zvi
Simon R. Blackburn
Boaz Tsaban
Lattice-Based Fully Dynamic Multi-key FHE with Short Ciphertexts
190(24)
Zvika Brakerski
Renen Perlman
Cryptography with Auxiliary Input and Trapdoor from Constant-Noise LPN
214(33)
Yu Yu
Jiang Zhang
Cryptography in Theory and Practice
The Multi-user Security of Authenticated Encryption: AES-GCM in TLS 1.3
247(30)
Mihir Bellare
Bjorn Tackmann
A Modular Treatment of Cryptographic APIs: The Symmetric-Key Case
277(31)
Thomas Shrimpton
Martijn Stam
Bogdan Warinschi
Encryption Switching Protocols
308(33)
Geoffroy Couteau
Thomas Peters
David Pointcheval
Compromised Systems
Message Transmission with Reverse Firewalls---Secure Communication on Corrupted Machines
341(32)
Yevgeniy Dodis
Ilya Mironov
Noah Stephens-Davidowitz
Big-Key Symmetric Encryption: Resisting Key Exfiltration
373(30)
Mihir Bellare
Daniel Kane
Phillip Rogaway
Backdoors in Pseudorandom Number Generators: Possibility and Impossibility Results
403(32)
Jean Paul Degabriele
Kenneth G. Paterson
Jacob C.N. Schuldt
Joanne Woodage
Symmetric Cryptanalysis
A 270 Attack on the Full MISTY1
435(22)
Achiya Bar-On
Nathan Keller
Cryptanalysis of the FLIP Family of Stream Ciphers
457(22)
Sebastien Duval
Virginie Lallemand
Yann Rotella
Crypto 2016 Award Papers
The Magic of ELFs
479(30)
Mark Zhandry
Breaking the Circuit Size Barrier for Secure Computation Under DDH
509(34)
Elette Boyle
Niv Gilboa
Yuval Ishai
Algorithmic Number Theory
Extended Tower Number Field Sieve: A New Complexity for the Medium Prime Case
543(29)
Taechan Kim
Razvan Barbulescu
Efficient Algorithms for Supersingular Isogeny Diffie-Hellman
572(33)
Craig Costello
Patrick Longa
Michael Naehrig
Symmetric Primitives
New Insights on AES-Like SPN Ciphers
605(20)
Bing Sun
Meicheng Liu
Jian Guo
Longjiang Qu
Vincent Rijmen
Lightweight Multiplication in GF(2") with Applications to MDS Matrices.
625(29)
Christof Beierle
Thorsten Kranz
Gregor Leander
Another View of the Division Property
654(29)
Christina Boura
Anne Canteaut
Author Index 683