Progress in cryptology - AFRICACRYPT 2009: second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2009
|
Schriftenreihe: | Lecture notes in computer science
5580 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XI, 434 S. graph. Darst. 235 mm x 155 mm |
ISBN: | 3642023835 9783642023835 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035589272 | ||
003 | DE-604 | ||
005 | 20090806 | ||
007 | t| | ||
008 | 090629s2009 xx d||| |||| 10||| eng d | ||
015 | |a 09N210094 |2 dnb | ||
016 | 7 | |a 99407932X |2 DE-101 | |
020 | |a 3642023835 |c PB. : ca. EUR 60.94 (freier Pr.), ca. sfr 88.50 (freier Pr.) |9 3-642-02383-5 | ||
020 | |a 9783642023835 |c PB. : ca. EUR 60.94 (freier Pr.), ca. sfr 88.50 (freier Pr.) |9 978-3-642-02383-5 | ||
035 | |a (OCoLC)401156651 | ||
035 | |a (DE-599)DNB99407932X | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-91G |a DE-706 |a DE-11 |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Progress in cryptology - AFRICACRYPT 2009 |b second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings |c Bart Preneel (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2009 | |
300 | |a XI, 434 S. |b graph. Darst. |c 235 mm x 155 mm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5580 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Kryptologie - Kongress - Gammarth <2009> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Computers |x Access control |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2009 |z Gammarth |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
700 | 1 | |a Preneel, Bart |d 1963- |e Sonstige |0 (DE-588)121965252 |4 oth | |
711 | 2 | |a Africacrypt |n 2 |d 2009 |c Gammarth |j Sonstige |0 (DE-588)16013083-9 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5580 |w (DE-604)BV000000607 |9 5580 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017644522&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-017644522 |
Datensatz im Suchindex
_version_ | 1820875133493968896 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
HASH FUNCTIONS SECOND PREIMAGE ATTACK ON 5-PASS HAVAL AND PARTIAL
KEY-RECOVERY ATTACK ON HMAC/NMAC-5-PASS HAVAL 1
GAOLI WANG AND SHAOHUI WANG
CRYPTANALYSIS OF VORTEX 14
JEAN-PHILIPPE AUMASSON, ORR DUNKELMAN, FLORIAN MENDEL, CHRISTIAN
RECHBERGER, AND S0REN S. THOMSEN
TWO PASSES OF TIGER ARE NOT ONE-WAY 29
FLORIAN MENDEL
BLOCK CIPHERS
GENERIC ATTACKS ON FEISTEL NETWORKS WITH INTERNAL PERMUTATIONS 41 JOANA
TREGER AND JACQUES PATARIN
DISTINGUISHERS FOR CIPHERS AND KNOWN KEY ATTACK AGAINST RIJNDAEL WITH
LARGE BLOCKS 60
MARINE MINIER, RAPHAEL C.-W. PHAN, AND BENJAMIN POUSSE
ASYMMETRIC ENCRYPTION
REDUCING KEY LENGTH OF THE MCELIECE CRYPTOSYSTEM 77
THIERRY P. BERGER, PIERRE-LOUIS CAYREL, PHILIPPE GABORIT, AND AYOUB
OTMANI
CRYPTANALYSIS OF RSA USING THE RATIO OF THE PRIMES 98
ABDERRAHMANE NITAJ
DIGITAL SIGNATURES
NEW RSA-BASED (SELECTIVELY) CONVERTIBLE UNDENIABLE SIGNATURE SCHEMES 116
LE TRIEU PHONG, KAORU KUROSAWA, AND WAKAHA OGATA
A SCHNORR-LIKE LIGHTWEIGHT IDENTITY-BASED SIGNATURE SCHEME 135 DAVID
GALINDO AND FLAVIO D. GARCIA
ON THE THEORETICAL GAP BETWEEN GROUP SIGNATURES WITH AND WITHOUT
UNLINKABILITY 149
GO OHTAKE, ARISA FUJII, GOICHIRO HANAOKA, AND KAZUTO OGAWA
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/99407932X
DIGITALISIERT DURCH
IMAGE 2
X TABLE OF CONTENTS
PRACTICAL THRESHOLD SIGNATURES WITH LINEAR SECRET SHARING SCHEMES 167
ILKER NADI BOZKURT, KAMER KAYA, AND ALI AYDM SELCUK
ASYMMETRIC ENCRYPTION AND ANONYMITY
CERTIFIED ENCRYPTION REVISITED 179
POOYA FARSHIM AND BOGDAN WARINSCHI
THRESHOLD ATTRIBUTE-BASED SIGNATURES AND THEIR APPLICATION TO ANONYMOUS
CREDENTIAL SYSTEMS 198
SIAMAK F. SHAHANDASHTI AND REIHANEH SAFAVI-NAINI
ANONYMITY FROM PUBLIC KEY ENCRYPTION TO UNDENIABLE SIGNATURES 217 LAILA
EL AIMANI
KEY AGREEMENT PROTOCOLS
SECURITY ANALYSIS OF STANDARD AUTHENTICATION AND KEY AGREEMENT PROTOCOLS
UTILISING TIMESTAMPS 235
MANUEL BARBOSA AND POOYA FARSHIM
PASSWORD-AUTHENTICATED GROUP KEY AGREEMENT WITH ADAPTIVE SECURITY AND
CONTRIBUTIVENESS 254
MICHEL ABDALLA, DARIO CATALANO, CELINE CHEVALIER, AND DAVID POINTCHEVAL
CRYPTOGRAPHIC PROTOCOLS
UNIFYING ZERO-KNOWLEDGE PROOFS OF KNOWLEDGE 272
VEIL MAURER
CO-SOUND ZERO-KNOWLEDGE WITH PUBLIC KEYS 287
CARMINE VENTRE AND IVAN VISCONTI
ANOTHER LOOK AT EXTENDED PRIVATE INFORMATION RETRIEVAL PROTOCOLS 305
JULIEN BRINGER AND HERVE CHABANNE
CONSTRUCTING UNIVERSALLY COMPOSABLE OBLIVIOUS TRANSFERS FROM DOUBLE
TRAP-DOOR ENCRYPTIONS 323
HUAFEI ZHU AND FENG BAO
EFFICIENT IMPLEMENTATIONS
EXPONENT RECODING AND REGULAR EXPONENTIATION ALGORITHMS 334 MARC JOYE
AND MICHAEL TUNSTALL
IMAGE 3
TABLE OF CONTENTS XI
EFFICIENT ACCELERATION OF ASYMMETRIC CRYPTOGRAPHY ON GRAPHICS HARDWARE
350
OWEN HARRISON AND JOHN WALDRON
FAST ELLIPTIC-CURVE CRYPTOGRAPHY ON THE CELL BROADBAND ENGINE 368 NEIL
COSTIGAN AND PETER SCHWABE
ON MODULAR DECOMPOSITION OF INTEGERS 386
BILLY BOB BRUMLEY AND KAISA NYBERG
IMPLEMENTATION ATTACKS
BREAKING K E E L OQ IN A FLASH: ON EXTRACTING KEYS AT LIGHTNING SPEED
403
MARKUS KASPER, TIMO KASPER, AMIR MORADI, AND CHRISTOF PAAR
AN IMPROVED FAULT BASED ATTACK OF THE ADVANCED ENCRYPTION STANDARD 421
DEBDEEP MUKHOPADHYAY
AUTHOR INDEX 435 |
any_adam_object | 1 |
author_GND | (DE-588)121965252 |
building | Verbundindex |
bvnumber | BV035589272 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)401156651 (DE-599)DNB99407932X |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035589272</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090806</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">090629s2009 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">09N210094</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">99407932X</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642023835</subfield><subfield code="c">PB. : ca. EUR 60.94 (freier Pr.), ca. sfr 88.50 (freier Pr.)</subfield><subfield code="9">3-642-02383-5</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642023835</subfield><subfield code="c">PB. : ca. EUR 60.94 (freier Pr.), ca. sfr 88.50 (freier Pr.)</subfield><subfield code="9">978-3-642-02383-5</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)401156651</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB99407932X</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-11</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Progress in cryptology - AFRICACRYPT 2009</subfield><subfield code="b">second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings</subfield><subfield code="c">Bart Preneel (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2009</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XI, 434 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">235 mm x 155 mm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5580</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie - Kongress - Gammarth <2009></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computers</subfield><subfield code="x">Access control</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2009</subfield><subfield code="z">Gammarth</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Preneel, Bart</subfield><subfield code="d">1963-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)121965252</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">Africacrypt</subfield><subfield code="n">2</subfield><subfield code="d">2009</subfield><subfield code="c">Gammarth</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16013083-9</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5580</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5580</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017644522&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-017644522</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2009 Gammarth gnd-content |
genre_facet | Konferenzschrift 2009 Gammarth |
id | DE-604.BV035589272 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:10:48Z |
institution | BVB |
institution_GND | (DE-588)16013083-9 |
isbn | 3642023835 9783642023835 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-017644522 |
oclc_num | 401156651 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-706 DE-11 DE-83 |
owner_facet | DE-91G DE-BY-TUM DE-706 DE-11 DE-83 |
physical | XI, 434 S. graph. Darst. 235 mm x 155 mm |
publishDate | 2009 |
publishDateSearch | 2009 |
publishDateSort | 2009 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings Bart Preneel (ed.) Berlin [u.a.] Springer 2009 XI, 434 S. graph. Darst. 235 mm x 155 mm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5580 Literaturangaben Kryptologie - Kongress - Gammarth <2009> Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2009 Gammarth gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Preneel, Bart 1963- Sonstige (DE-588)121965252 oth Africacrypt 2 2009 Gammarth Sonstige (DE-588)16013083-9 oth Lecture notes in computer science 5580 (DE-604)BV000000607 5580 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017644522&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings Lecture notes in computer science Kryptologie - Kongress - Gammarth <2009> Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)1071861417 |
title | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings |
title_auth | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings |
title_exact_search | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings |
title_full | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings Bart Preneel (ed.) |
title_fullStr | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings Bart Preneel (ed.) |
title_full_unstemmed | Progress in cryptology - AFRICACRYPT 2009 second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings Bart Preneel (ed.) |
title_short | Progress in cryptology - AFRICACRYPT 2009 |
title_sort | progress in cryptology africacrypt 2009 second international conference on cryptology in africa gammarth tunisia june 21 25 2009 proceedings |
title_sub | second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009 ; proceedings |
topic | Kryptologie - Kongress - Gammarth <2009> Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptologie - Kongress - Gammarth <2009> Computer security Congresses Computers Access control Congresses Cryptography Congresses Kryptologie Konferenzschrift 2009 Gammarth |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=017644522&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT preneelbart progressincryptologyafricacrypt2009secondinternationalconferenceoncryptologyinafricagammarthtunisiajune21252009proceedings AT africacryptgammarth progressincryptologyafricacrypt2009secondinternationalconferenceoncryptologyinafricagammarthtunisiajune21252009proceedings |