Codes, cryptology and information se...
C2SI (Conference) (2019 :)

FindBook      Google Book      Amazon      博客來     
  • Codes, cryptology and information security = third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019 : proceedings; in honor of Said El Hajji /
  • 紀錄類型: 書目-電子資源 : Monograph/item
    正題名/作者: Codes, cryptology and information security/ edited by Claude Carlet ... [et al.].
    其他題名: third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019 : proceedings; in honor of Said El Hajji /
    其他題名: C2SI 2019
    其他作者: Carlet, Claude.
    團體作者: C2SI (Conference)
    出版者: Cham :Springer International Publishing : : 2019.,
    面頁冊數: xix, 482 p. :ill. (some col.), digital ;24 cm.
    內容註: Side-channel analysis -- Virtual Security Evaluation -- Cache-Timing Attacks still threaten IoT devices -- Speed-up of SCA attacks on 32-bit multiplications. Cryptography -- Arabic Cryptography and Steganography in Morocco -- An AEAD variant of the Grain stream cipher -- Construction for a Nominative Signature Scheme from Lattice with Enhanced Security -- Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG -- A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem -- Non-Interactive Zero Knowledge Proofs in the Random Oracle Model -- From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions -- Secret sharing -- Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments -- Secret Sharing using Near-MDS Codes -- Mathematics for cryptography -- On Plateaued Functions, Linear Structures and Permutation Polynomials -- Faster Scalar Multiplication on the x-line: Three-dimensional GLV Method with Three-dimensional Differential Addition Chains -- Codes and their applications -- On good polynomials over finite fields for optimal locally recoverable codes -- A New Gabidulin-like Code and its Application in Cryptography -- Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum π-distance 3 -- Quasi-Dyadic Girault Identification Scheme -- Homomorphic encryption -- Securely aggregating testimonies with Threshold Multi-key FHE -- Improved Efficiency of a Linearly Homomorphic Cryptosystem -- Applied cryptography -- On the Tracing Traitors Math Dedicated to the memory of Bob Blakley - pioneer of digital fingerprinting and inventor of secret sharing -- Reusable Garbled Turing Machines without FHE -- An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness -- A Practical and Insider Secure Signcryption with Non-Interactive Non-Repudiation -- Security -- Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems -- Managing Your Kleptographic Subscription Plan -- Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification.
    Contained By: Springer Nature eBook
    標題: Data encryption (Computer science) - Congresses. -
    電子資源: https://doi.org/10.1007/978-3-030-16458-4
    ISBN: 9783030164584
館藏地:  出版年:  卷號: 
館藏
  • 1 筆 • 頁數 1 •
 
W9403833 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C2 2019 一般使用(Normal) 在架 0
  • 1 筆 • 頁數 1 •
多媒體
評論
Export
取書館
 
 
變更密碼
登入