Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.
  Previous Record Previous Item Next Item Next Record
  Reviews, Summaries, etc...
EBOOK
Conference International Conference on Cryptology in Africa (3rd : 2010 : Stellenbosch, South Africa)
Title Progress in cryptology - Africacrypt 2010 : third international conference on cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. proceedings / Daniel J. Bernstein, Tanja Lange, Eds.
Imprint Berlin ; New York : Springer, 2010.
Edition First edition.

LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online
Conference International Conference on Cryptology in Africa (3rd : 2010 : Stellenbosch, South Africa)
Series Lecture notes in computer science, 0302-9743 ; 6055
LNCS sublibrary. SL 4, Security and cryptology
Lecture notes in computer science ; 6055. 0302-9743
LNCS sublibrary. SL 4, Security and cryptology.
Subject Computer security -- Congresses.
Computers -- Access control.
Cryptography.
Computer Security.
Alt Name Bernstein, Daniel J.
Lange, Tanja.
Description 1 online resource (xiii, 436 pages) : illustrations.
Edition First edition.
Bibliography Note Includes bibliographical references and index.
Contents Signatures. A new RSA-based signature scheme / Sven Schage and Jorg Schwenk -- Fair blind signatures without random oracles / Georg Fuchsbauer and Damien Vergnaud -- Fair partially blind signatures / Markus Ruckert and Dominique Schroder -- Attacks. Parallel shortest lattice vector enumeration on graphics cards / Jens Hermans, Michael Schneider, Johannes Buchmann, Frederik Vercauteren, and Bart Preneel -- Flexible partial enlargement to accelerate Grobner basis computation over F₂ / Johannes Buchmann, Daniel Cabarcas, Jintai Ding, and Mohamed Saied Emam Mohamed -- Factoring RSA modulus using prime reconstruction from random known bits / Subhamoy Maitra, Santanu Sarkar, and Sourav Sen Gupta -- Protocols. Proofs of restricted shuffles / Bjorn Terelius and Douglas Wikstrom -- Batch range proof for practical small ranges / Kun Peng and Feng Bao -- Optimistic fair priced oblivious transfer / Alfredo Rial and Bart Preneel -- Networks. Information-theoretically secure key-insulated multireceiver authentication codes / Takenobu Seito, Tadashi Aikawa, Junji Shikata, and Tsutomu Matsumoto -- Simple and communication complexity efficient almost secure and perfectly secure message transmission schemes / Yvo Desmedt, Stelios Erotokritou, and Reihaneh Safavi-Naini -- Communication efficient perfectly secure VSS and MPC in asynchronous networks with optimal resilience / Arpita Patra, Ashish Choudhury, and C. Pandu Rangan -- Elliptic curves. Avoiding full extension field arithmetic in pairing computations / Craig Costello, Colin Boyd, Juan Manuel Gonzalez Nieto, and Kenneth Koon-Ho Wong -- ECC2K-130 on cell CPUs / Joppe W. Bos, Thorsten Kleinjung, Ruben Niederhagen, and Peter Schwabe -- Side-channel attacks and fault attacks practical improvements of profiled side-channel attacks on a hardware crypto-accelerator / M. Abdelaziz Elaabid and Sylvain Guilley -- Differential fault analysis of HC-128 / Aleksandar Kircanski and Amr M. Youssef -- Fresh re-keying : security against side-channel and fault attacks for low-cost devices / Marcel Medwed, Francois-Xavier Standaert, Johann Groschadl, and Francesco Regazzoni -- Public-key encryption. Strong cryptography from weak secrets : building efficient PKE and IBE from distributed passwords / Xavier Boyen, Celine Chevalier, Georg Fuchsbauer, and David Pointcheval -- Efficient unidirectional proxy re-encryption / Sherman S.M. Chow, Jian Weng, Yanjiang Yang, and Robert H. Deng -- Public-key encryption with non-interactive opening : new constructions and stronger definitions / David Galindo, Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja Lehmann, Mark Manulis, and Dominique Schroder -- Keys and PUFs. Flexible group key exchange with on-demand computation of subgroup keys / Michel Abdalla, Celine Chevalier, Mark Manulis, and David Pointcheval -- Quantum readout of physical unclonable functions / Boris Skoric -- Ciphers and hash functions. Parallelizing the Camellia and SMS4 block ciphers / Huihui Yap, Khoongming Khoo, and Axel Poschmann -- Improved linear differential attacks on CubeHash / Shahram Khazaei, Simon Knellwolf, Willi Meier, and Deian Stefan -- Cryptanalysis of the 10-round hash and full compression function of SHAvite-3-512 / Praveen Gauravaram, Gaetan Leurent, Florian Mendel, Maria Naya-Plasencia, Thomas Peyrin, Christian Rechberger, and Martin Schlaffer.
Summary This book constitutes the proceedings of the Third International Conference on Cryptology in Africa, AFRICACRYPT 2010, held in Stellenbosch, South Africa, on May 3-6, 2010. The 25 papers presented together with three invited talks were carefully reviewed and selected from 82 submissions. The topics covered are signatures, attacks, protocols, networks, elliptic curves, side-channel attacks and fault attacks, public-key encryption, keys and PUFs, and ciphers and hash functions.
ISBN 9783642126772 (softcover ; alk. paper)
3642126774 (softcover ; alk. paper)
9783642126789
3642126782
ISBN/ISSN 10.1007/978-3-642-12678-9
Publisher # 80013130
OCLC # 610588576
Additional Format Print version: Progress in cryptology - Africacrypt 2010. Berlin : Springer, 2010 9783642126772 (DLC) 2010924884 (OCoLC)609533249


If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team