Progress in cryptology: AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2008
|
Schriftenreihe: | Lecture notes in computer science
5023 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XI, 414 S. graph. Darst. 24 cm |
ISBN: | 9783540681595 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV023332264 | ||
003 | DE-604 | ||
005 | 20080703 | ||
007 | t| | ||
008 | 080606s2008 xx d||| |||| 10||| eng d | ||
015 | |a 08,N19,0037 |2 dnb | ||
016 | 7 | |a 988332418 |2 DE-101 | |
020 | |a 9783540681595 |c kart. : EUR 59.92 (freier Pr.), sfr 93.00 (freier Pr.) |9 978-3-540-68159-5 | ||
024 | 3 | |a 9783540681595 | |
028 | 5 | 2 | |a 12271184 |
035 | |a (OCoLC)227032579 | ||
035 | |a (DE-599)DNB988332418 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-703 |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Progress in cryptology |b AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings |c Serge Vaudenay (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2008 | |
300 | |a XI, 414 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5023 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |z Casablanca |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Vaudenay, Serge |e Sonstige |4 oth | |
711 | 2 | |a Africacrypt |n 1 |d 2008 |c ad-Dār al-Baiḍā' |j Sonstige |0 (DE-588)10344310-1 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5023 |w (DE-604)BV000000607 |9 5023 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016516174&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016516174 |
Datensatz im Suchindex
_version_ | 1820875043389833216 |
---|---|
adam_text |
GESCANNT DURCH TABLE OF CONTENTS AES IMPROVING INTEGRAL ATTACKS AGAINST
RIJNDAEL-256 UP TO 9 ROUNDS 1 SAMUEL GALICE AND MARINE MINIER
IMPLEMENTATION OF THE AES-128 ON VIRTEX-5 FPGAS 16 PHILIPPE BULENS,
FRANGOIS-XAVIER STANDAERT, JEAN-JACQUES QUISQUATER, PASCAL PELLEGRIN,
AND GAEL ROUVROY ANALYSIS OF RFID PROTOCOLS WEAKNESSES IN A RECENT
ULTRA-LIGHTWEIGHT RFID AUTHENTICATION PROTOCOL 27 PAOLO D'ARCO AND
ALFREDO DE SANTIS DIFFERENTIAL CRYPTANALYSIS OF REDUCED-ROUND PRESENT 40
MEIQIN WANG INVITED TALK THE PSYCHOLOGY OF SECURITY 50 BRUCE SCHNEIER
CRYPTOGRAPHIC PROTOCOLS AN (ALMOST) CONSTANT-EFFORT
SOLUTION-VERIFICATION PROOF-OF-WORK PROTOCOL BASED ON MERKLE TREES 80
FABIEN COELHO ROBUST THRESHOLD SCHEINES BASED ON THE CHINESE REMAINDER
THEOREM 94 KAMER KAYA AND ALI AYDIN SELCUK AN AUTHENTICATION PROTOCOL
VVITH ENCRYPTED BIOMETRIE DATA 109 JULIEN BRINGER AND HERVE CHABANNE
AUTHENTICATION AUTHENTICATED ENCRYPTION MODE FOR BEYOND THE BIRTHDAY
BOUND SECURITY 125 TETSU IWATA BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/988332418 DIGITALISIERT DURCH * * * * * TABLE OF
CONTENTS XI BROADCAST ENCRYPTION ATTRIBUTE-BASED BROADCAST ENCRYPTION
SCHEME MADE EFFICIENT 325 DAVID LUBICZ AND THOMAS SIRVENT LOWER BOUNDS
FOR SUBSET COVER BASED BROADCAST ENCRYPTION 343 PER AUSTRIN AND GUNNAR
KREITZ INVITED TALK A BRIEF HISTORY OF PROVABLY-SECURE PUBLIC-KEY
ENCRYPTION 357 ALEXANDER W. DENT IMPLEMENTATION ON COMPRESSIBLE PAIRINGS
AND THEIR COMPUTATION 371 MICHAEL NAEHRIG, PAULO S.L.M. BARRETO, AND
PETER SCHWABE TWISTED EDWARDS CURVES 389 DANIEL J. BERNSTEIN, PETER
BIRKNER, MARC JOYE, TANJA LANGE, AND CHRISTIANE PETERS EFFICIENT
MULTIPLICATION IN F 3 M 1 AND 5 I 18 406 MURAT CENK AND FERRUH
OZBUDAK AUTHOR INDEX 415 |
adam_txt |
GESCANNT DURCH TABLE OF CONTENTS AES IMPROVING INTEGRAL ATTACKS AGAINST
RIJNDAEL-256 UP TO 9 ROUNDS 1 SAMUEL GALICE AND MARINE MINIER
IMPLEMENTATION OF THE AES-128 ON VIRTEX-5 FPGAS 16 PHILIPPE BULENS,
FRANGOIS-XAVIER STANDAERT, JEAN-JACQUES QUISQUATER, PASCAL PELLEGRIN,
AND GAEL ROUVROY ANALYSIS OF RFID PROTOCOLS WEAKNESSES IN A RECENT
ULTRA-LIGHTWEIGHT RFID AUTHENTICATION PROTOCOL 27 PAOLO D'ARCO AND
ALFREDO DE SANTIS DIFFERENTIAL CRYPTANALYSIS OF REDUCED-ROUND PRESENT 40
MEIQIN WANG INVITED TALK THE PSYCHOLOGY OF SECURITY 50 BRUCE SCHNEIER
CRYPTOGRAPHIC PROTOCOLS AN (ALMOST) CONSTANT-EFFORT
SOLUTION-VERIFICATION PROOF-OF-WORK PROTOCOL BASED ON MERKLE TREES 80
FABIEN COELHO ROBUST THRESHOLD SCHEINES BASED ON THE CHINESE REMAINDER
THEOREM 94 KAMER KAYA AND ALI AYDIN SELCUK AN AUTHENTICATION PROTOCOL
VVITH ENCRYPTED BIOMETRIE DATA 109 JULIEN BRINGER AND HERVE CHABANNE
AUTHENTICATION AUTHENTICATED ENCRYPTION MODE FOR BEYOND THE BIRTHDAY
BOUND SECURITY 125 TETSU IWATA BIBLIOGRAFISCHE INFORMATIONEN
HTTP://D-NB.INFO/988332418 DIGITALISIERT DURCH * * * * * TABLE OF
CONTENTS XI BROADCAST ENCRYPTION ATTRIBUTE-BASED BROADCAST ENCRYPTION
SCHEME MADE EFFICIENT 325 DAVID LUBICZ AND THOMAS SIRVENT LOWER BOUNDS
FOR SUBSET COVER BASED BROADCAST ENCRYPTION 343 PER AUSTRIN AND GUNNAR
KREITZ INVITED TALK A BRIEF HISTORY OF PROVABLY-SECURE PUBLIC-KEY
ENCRYPTION 357 ALEXANDER W. DENT IMPLEMENTATION ON COMPRESSIBLE PAIRINGS
AND THEIR COMPUTATION 371 MICHAEL NAEHRIG, PAULO S.L.M. BARRETO, AND
PETER SCHWABE TWISTED EDWARDS CURVES 389 DANIEL J. BERNSTEIN, PETER
BIRKNER, MARC JOYE, TANJA LANGE, AND CHRISTIANE PETERS EFFICIENT
MULTIPLICATION IN F 3 M 1 AND 5 I 18 406 MURAT CENK AND FERRUH
OZBUDAK AUTHOR INDEX 415 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
building | Verbundindex |
bvnumber | BV023332264 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)227032579 (DE-599)DNB988332418 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV023332264</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20080703</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">080606s2008 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N19,0037</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">988332418</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540681595</subfield><subfield code="c">kart. : EUR 59.92 (freier Pr.), sfr 93.00 (freier Pr.)</subfield><subfield code="9">978-3-540-68159-5</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540681595</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12271184</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)227032579</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB988332418</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Progress in cryptology</subfield><subfield code="b">AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings</subfield><subfield code="c">Serge Vaudenay (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 414 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5023</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Casablanca</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Vaudenay, Serge</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Africacrypt</subfield><subfield code="n">1</subfield><subfield code="d">2008</subfield><subfield code="c">ad-Dār al-Baiḍā'</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10344310-1</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5023</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5023</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016516174&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016516174</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 Casablanca gnd-content |
genre_facet | Konferenzschrift 2008 Casablanca |
id | DE-604.BV023332264 |
illustrated | Illustrated |
index_date | 2024-07-02T20:58:06Z |
indexdate | 2025-01-10T15:09:21Z |
institution | BVB |
institution_GND | (DE-588)10344310-1 |
isbn | 9783540681595 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016516174 |
oclc_num | 227032579 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-703 DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-703 DE-83 DE-11 |
physical | XI, 414 S. graph. Darst. 24 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings Serge Vaudenay (ed.) Berlin [u.a.] Springer 2008 XI, 414 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5023 Literaturangaben Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 Casablanca gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Vaudenay, Serge Sonstige oth Africacrypt 1 2008 ad-Dār al-Baiḍā' Sonstige (DE-588)10344310-1 oth Lecture notes in computer science 5023 (DE-604)BV000000607 5023 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016516174&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings Lecture notes in computer science Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings |
title_auth | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings |
title_exact_search | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings |
title_exact_search_txtP | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings |
title_full | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings Serge Vaudenay (ed.) |
title_fullStr | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings Serge Vaudenay (ed.) |
title_full_unstemmed | Progress in cryptology AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings Serge Vaudenay (ed.) |
title_short | Progress in cryptology |
title_sort | progress in cryptology africacrypt 2008 first international conference on cryptology in africa casablanca morocco june 11 14 2008 proceedings |
title_sub | AFRICACRYPT 2008, First International Conference on Cryptology in Africa, Casablanca, Morocco, June 11 - 14, 2008 ; proceedings |
topic | Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie Konferenzschrift 2008 Casablanca |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016516174&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT vaudenayserge progressincryptologyafricacrypt2008firstinternationalconferenceoncryptologyinafricacasablancamoroccojune11142008proceedings AT africacryptaddaralbaida progressincryptologyafricacrypt2008firstinternationalconferenceoncryptologyinafricacasablancamoroccojune11142008proceedings |