Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.

LEADER 00000cam  2200721 i 4500 
001    610588576 
003    OCoLC 
005    20181101051215.9 
006    m     o  d         
007    cr |n||||||||| 
008    100317s2010    nyua    ob    101 0 eng c 
010    2010924884 
019    644647833|a649904831|a663096312|a769767836|a880312147
020    9783642126772|q(softcover ;|qalk. paper) 
020    3642126774|q(softcover ;|qalk. paper) 
020    9783642126789 
020    3642126782 
024 7  10.1007/978-3-642-12678-9|2doi 
028 52 80013130 
035    (OCoLC)610588576|z(OCoLC)644647833|z(OCoLC)649904831
037    978-3-642-12677-2|bSpringer|n 
040    COO|beng|epn|erda|cCOO|dCUS|dVLB|dE7B|dGW5XE|dBTCTA|dOCLCQ
042    pcc 
049    MAIN 
050  4 QA76.9.A25|bI55382 2010 
060  4 QA 76.9.A25 
072  7 QA|2lcco 
072  7 URY|2bicssc 
072  7 COM053000|2bisacsh 
082 04 005.8|222 
111 2  International Conference on Cryptology in Africa|0http://|n(3rd :|d2010 :
       |cStellenbosch, South Africa) 
245 10 Progress in cryptology - Africacrypt 2010 :|bthird 
       international conference on cryptology in Africa, 
       Stellenbosch, South Africa, May 3-6, 2010. proceedings /
       |cDaniel J. Bernstein, Tanja Lange, Eds. 
250    First edition. 
264  1 Berlin ;|aNew York :|bSpringer,|c2010. 
300    1 online resource (xiii, 436 pages) :|billustrations. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file|2rdaft|0
490 1  Lecture notes in computer science,|x0302-9743 ;|v6055 
490 1  LNCS sublibrary. SL 4, Security and cryptology 
504    Includes bibliographical references and index. 
505 0  Signatures. A new RSA-based signature scheme / Sven Schage
       and Jorg Schwenk -- Fair blind signatures without random 
       oracles / Georg Fuchsbauer and Damien Vergnaud -- Fair 
       partially blind signatures / Markus Ruckert and Dominique 
       Schroder -- Attacks. Parallel shortest lattice vector 
       enumeration on graphics cards / Jens Hermans, Michael 
       Schneider, Johannes Buchmann, Frederik Vercauteren, and 
       Bart Preneel -- Flexible partial enlargement to accelerate
       Grobner basis computation over F₂ / Johannes Buchmann, 
       Daniel Cabarcas, Jintai Ding, and Mohamed Saied Emam 
       Mohamed -- Factoring RSA modulus using prime 
       reconstruction from random known bits / Subhamoy Maitra, 
       Santanu Sarkar, and Sourav Sen Gupta -- Protocols. Proofs 
       of restricted shuffles / Bjorn Terelius and Douglas 
       Wikstrom -- Batch range proof for practical small ranges /
       Kun Peng and Feng Bao -- Optimistic fair priced oblivious 
       transfer / Alfredo Rial and Bart Preneel -- Networks. 
       Information-theoretically secure key-insulated 
       multireceiver authentication codes / Takenobu Seito, 
       Tadashi Aikawa, Junji Shikata, and Tsutomu Matsumoto -- 
       Simple and communication complexity efficient almost 
       secure and perfectly secure message transmission schemes /
       Yvo Desmedt, Stelios Erotokritou, and Reihaneh Safavi-
       Naini -- Communication efficient perfectly secure VSS and 
       MPC in asynchronous networks with optimal resilience / 
       Arpita Patra, Ashish Choudhury, and C. Pandu Rangan -- 
       Elliptic curves. Avoiding full extension field arithmetic 
       in pairing computations / Craig Costello, Colin Boyd, Juan
       Manuel Gonzalez Nieto, and Kenneth Koon-Ho Wong -- ECC2K-
       130 on cell CPUs / Joppe W. Bos, Thorsten Kleinjung, Ruben
       Niederhagen, and Peter Schwabe -- Side-channel attacks and
       fault attacks practical improvements of profiled side-
       channel attacks on a hardware crypto-accelerator / M. 
       Abdelaziz Elaabid and Sylvain Guilley -- Differential 
       fault analysis of HC-128 / Aleksandar Kircanski and Amr M.
       Youssef -- Fresh re-keying : security against side-channel
       and fault attacks for low-cost devices / Marcel Medwed, 
       Francois-Xavier Standaert, Johann Groschadl, and Francesco
       Regazzoni -- Public-key encryption. Strong cryptography 
       from weak secrets : building efficient PKE and IBE from 
       distributed passwords / Xavier Boyen, Celine Chevalier, 
       Georg Fuchsbauer, and David Pointcheval -- Efficient 
       unidirectional proxy re-encryption / Sherman S.M. Chow, 
       Jian Weng, Yanjiang Yang, and Robert H. Deng -- Public-key
       encryption with non-interactive opening : new 
       constructions and stronger definitions / David Galindo, 
       Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja 
       Lehmann, Mark Manulis, and Dominique Schroder -- Keys and 
       PUFs. Flexible group key exchange with on-demand 
       computation of subgroup keys / Michel Abdalla, Celine 
       Chevalier, Mark Manulis, and David Pointcheval -- Quantum 
       readout of physical unclonable functions / Boris Skoric --
       Ciphers and hash functions. Parallelizing the Camellia and
       SMS4 block ciphers / Huihui Yap, Khoongming Khoo, and Axel
       Poschmann -- Improved linear differential attacks on 
       CubeHash / Shahram Khazaei, Simon Knellwolf, Willi Meier, 
       and Deian Stefan -- Cryptanalysis of the 10-round hash and
       full compression function of SHAvite-3-512 / Praveen 
       Gauravaram, Gaetan Leurent, Florian Mendel, Maria Naya-
       Plasencia, Thomas Peyrin, Christian Rechberger, and Martin
520    This book constitutes the proceedings of the Third 
       International Conference on Cryptology in Africa, 
       AFRICACRYPT 2010, held in Stellenbosch, South Africa, on 
       May 3-6, 2010. The 25 papers presented together with three
       invited talks were carefully reviewed and selected from 82
       submissions. The topics covered are signatures, attacks, 
       protocols, networks, elliptic curves, side-channel attacks
       and fault attacks, public-key encryption, keys and PUFs, 
       and ciphers and hash functions. 
650  0 Computer security|vCongresses.|0
650  0 Computers|xAccess control.|0
650  0 Cryptography.|0
650  2 Computer Security.|0 
655  2 Congress.|0 
655  4 Electronic books. 
655  7 Conference papers and proceedings.|2fast|0http:// 
655  7 Electronic books.|2lcgft 
655  7 Conference papers and proceedings.|2lcgft|0http:// 
700 1  Bernstein, Daniel J.|0
700 1  Lange, Tanja.|0
776 08 |iPrint version:|tProgress in cryptology - Africacrypt 
       2010.|dBerlin : Springer, 2010|z9783642126772|w(DLC)  
830  0 Lecture notes in computer science ;|0
830  0 LNCS sublibrary.|nSL 4,|pSecurity and cryptology.|0http:// 
990    SpringerLink|bSpringer English/International eBooks 2010 -
       Full Set|c2018-10-31|yNew collection 
View online

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team