Return to home page
Searching: Muskingum library catalog
Some OPAL libraries remain closed or are operating at reduced service levels. Materials from those libraries may not be requestable; requested items may take longer to arrive. Note that pickup procedures may differ between libraries. Please contact your library for new procedures, specific requests, or other assistance.

LEADER 00000cam  2200721 i 4500 
001    610588576 
003    OCoLC 
005    20181101051215.9 
006    m     o  d         
007    cr |n||||||||| 
008    100317s2010    nyua    ob    101 0 eng c 
010    2010924884 
019    644647833|a649904831|a663096312|a769767836|a880312147
       |a964912873|a1005826408|a1044251486 
020    9783642126772|q(softcover ;|qalk. paper) 
020    3642126774|q(softcover ;|qalk. paper) 
020    9783642126789 
020    3642126782 
024 7  10.1007/978-3-642-12678-9|2doi 
028 52 80013130 
035    (OCoLC)610588576|z(OCoLC)644647833|z(OCoLC)649904831
       |z(OCoLC)663096312|z(OCoLC)769767836|z(OCoLC)880312147
       |z(OCoLC)964912873|z(OCoLC)1005826408|z(OCoLC)1044251486 
037    978-3-642-12677-2|bSpringer|nhttp://www.springerlink.com 
040    COO|beng|epn|erda|cCOO|dCUS|dVLB|dE7B|dGW5XE|dBTCTA|dOCLCQ
       |dOCLCO|dOCLCQ|dOCLCF|dBEDGE|dOHS|dOCLCQ|dOCLCO|dA7U
       |dYDXCP|dSLY|dOCLCO|dOCL|dOCLCO|dOCLCQ|dOCLCO|dEBLCP
       |dOCLCQ|dOCLCO|dOCLCQ|dVT2|dDGU|dOCLCA|dUAB|dESU|dOCLCQ
       |dSHS|dIOG|dOCLCA|dBUF|dCEF|dTFW|dOCLCO|dU3W 
042    pcc 
049    MAIN 
050  4 QA76.9.A25|bI55382 2010 
060  4 QA 76.9.A25 
072  7 QA|2lcco 
072  7 URY|2bicssc 
072  7 COM053000|2bisacsh 
082 04 005.8|222 
111 2  International Conference on Cryptology in Africa|0http://
       id.loc.gov/authorities/names/nb2008012737|n(3rd :|d2010 :
       |cStellenbosch, South Africa) 
245 10 Progress in cryptology - Africacrypt 2010 :|bthird 
       international conference on cryptology in Africa, 
       Stellenbosch, South Africa, May 3-6, 2010. proceedings /
       |cDaniel J. Bernstein, Tanja Lange, Eds. 
250    First edition. 
264  1 Berlin ;|aNew York :|bSpringer,|c2010. 
300    1 online resource (xiii, 436 pages) :|billustrations. 
336    text|btxt|2rdacontent 
337    computer|bc|2rdamedia 
338    online resource|bcr|2rdacarrier 
347    text file|2rdaft|0http://rdaregistry.info/termList/
       fileType/1002 
490 1  Lecture notes in computer science,|x0302-9743 ;|v6055 
490 1  LNCS sublibrary. SL 4, Security and cryptology 
504    Includes bibliographical references and index. 
505 0  Signatures. A new RSA-based signature scheme / Sven Schage
       and Jorg Schwenk -- Fair blind signatures without random 
       oracles / Georg Fuchsbauer and Damien Vergnaud -- Fair 
       partially blind signatures / Markus Ruckert and Dominique 
       Schroder -- Attacks. Parallel shortest lattice vector 
       enumeration on graphics cards / Jens Hermans, Michael 
       Schneider, Johannes Buchmann, Frederik Vercauteren, and 
       Bart Preneel -- Flexible partial enlargement to accelerate
       Grobner basis computation over F₂ / Johannes Buchmann, 
       Daniel Cabarcas, Jintai Ding, and Mohamed Saied Emam 
       Mohamed -- Factoring RSA modulus using prime 
       reconstruction from random known bits / Subhamoy Maitra, 
       Santanu Sarkar, and Sourav Sen Gupta -- Protocols. Proofs 
       of restricted shuffles / Bjorn Terelius and Douglas 
       Wikstrom -- Batch range proof for practical small ranges /
       Kun Peng and Feng Bao -- Optimistic fair priced oblivious 
       transfer / Alfredo Rial and Bart Preneel -- Networks. 
       Information-theoretically secure key-insulated 
       multireceiver authentication codes / Takenobu Seito, 
       Tadashi Aikawa, Junji Shikata, and Tsutomu Matsumoto -- 
       Simple and communication complexity efficient almost 
       secure and perfectly secure message transmission schemes /
       Yvo Desmedt, Stelios Erotokritou, and Reihaneh Safavi-
       Naini -- Communication efficient perfectly secure VSS and 
       MPC in asynchronous networks with optimal resilience / 
       Arpita Patra, Ashish Choudhury, and C. Pandu Rangan -- 
       Elliptic curves. Avoiding full extension field arithmetic 
       in pairing computations / Craig Costello, Colin Boyd, Juan
       Manuel Gonzalez Nieto, and Kenneth Koon-Ho Wong -- ECC2K-
       130 on cell CPUs / Joppe W. Bos, Thorsten Kleinjung, Ruben
       Niederhagen, and Peter Schwabe -- Side-channel attacks and
       fault attacks practical improvements of profiled side-
       channel attacks on a hardware crypto-accelerator / M. 
       Abdelaziz Elaabid and Sylvain Guilley -- Differential 
       fault analysis of HC-128 / Aleksandar Kircanski and Amr M.
       Youssef -- Fresh re-keying : security against side-channel
       and fault attacks for low-cost devices / Marcel Medwed, 
       Francois-Xavier Standaert, Johann Groschadl, and Francesco
       Regazzoni -- Public-key encryption. Strong cryptography 
       from weak secrets : building efficient PKE and IBE from 
       distributed passwords / Xavier Boyen, Celine Chevalier, 
       Georg Fuchsbauer, and David Pointcheval -- Efficient 
       unidirectional proxy re-encryption / Sherman S.M. Chow, 
       Jian Weng, Yanjiang Yang, and Robert H. Deng -- Public-key
       encryption with non-interactive opening : new 
       constructions and stronger definitions / David Galindo, 
       Benoit Libert, Marc Fischlin, Georg Fuchsbauer, Anja 
       Lehmann, Mark Manulis, and Dominique Schroder -- Keys and 
       PUFs. Flexible group key exchange with on-demand 
       computation of subgroup keys / Michel Abdalla, Celine 
       Chevalier, Mark Manulis, and David Pointcheval -- Quantum 
       readout of physical unclonable functions / Boris Skoric --
       Ciphers and hash functions. Parallelizing the Camellia and
       SMS4 block ciphers / Huihui Yap, Khoongming Khoo, and Axel
       Poschmann -- Improved linear differential attacks on 
       CubeHash / Shahram Khazaei, Simon Knellwolf, Willi Meier, 
       and Deian Stefan -- Cryptanalysis of the 10-round hash and
       full compression function of SHAvite-3-512 / Praveen 
       Gauravaram, Gaetan Leurent, Florian Mendel, Maria Naya-
       Plasencia, Thomas Peyrin, Christian Rechberger, and Martin
       Schlaffer. 
520    This book constitutes the proceedings of the Third 
       International Conference on Cryptology in Africa, 
       AFRICACRYPT 2010, held in Stellenbosch, South Africa, on 
       May 3-6, 2010. The 25 papers presented together with three
       invited talks were carefully reviewed and selected from 82
       submissions. The topics covered are signatures, attacks, 
       protocols, networks, elliptic curves, side-channel attacks
       and fault attacks, public-key encryption, keys and PUFs, 
       and ciphers and hash functions. 
650  0 Computer security|vCongresses.|0http://id.loc.gov/
       authorities/subjects/sh2008101458 
650  0 Computers|xAccess control.|0http://id.loc.gov/authorities/
       subjects/sh85029553 
650  0 Cryptography.|0http://id.loc.gov/authorities/subjects/
       sh85034453 
650  2 Computer Security.|0https://id.nlm.nih.gov/mesh/D016494 
655  2 Congress.|0https://id.nlm.nih.gov/mesh/D016423 
655  4 Electronic books. 
655  7 Conference papers and proceedings.|2fast|0http://
       id.worldcat.org/fast/1423772 
655  7 Electronic books.|2lcgft 
655  7 Conference papers and proceedings.|2lcgft|0http://
       id.loc.gov/authorities/genreForms/gf2014026068 
700 1  Bernstein, Daniel J.|0http://id.loc.gov/authorities/names/
       n88661308 
700 1  Lange, Tanja.|0http://id.loc.gov/authorities/names/
       nr2001035670 
776 08 |iPrint version:|tProgress in cryptology - Africacrypt 
       2010.|dBerlin : Springer, 2010|z9783642126772|w(DLC)  
       2010924884|w(OCoLC)609533249 
830  0 Lecture notes in computer science ;|0http://id.loc.gov/
       authorities/names/n42015162|v6055.|x0302-9743 
830  0 LNCS sublibrary.|nSL 4,|pSecurity and cryptology.|0http://
       id.loc.gov/authorities/names/no2007042442 
990    SpringerLink|bSpringer English/International eBooks 2010 -
       Full Set|c2018-10-31|yNew collection 
       springerlink.ebooks2010|5OH1 
LOCATION CALL # STATUS MESSAGE
 OHIOLINK SPRINGER EBOOKS    ONLINE  
View online

If you experience difficulty accessing or navigating this content, please contact the OPAL Support Team