The Resource Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.)
Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.)
Resource Information
The item Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation
- Language
- eng
- Extent
- 1 online resource.
- Contents
-
- Erik Tews, Julian Wälde and Michael Weiner
- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
- Michelle Kendall and Keith M. Martin
- [Camma]-MAC[H2P] -- A New Universal MAC Scheme
- Ewan Fleischmann, Christian Forler and Stefan Lucks
- New Universal Hash Functions
- Aysajan Abidin and Jan-Åke Larsson
- Cryptanalysis of TWIS Block Cipher
- Onur Koçak and Neşe Öztop
- RSA Vulnerabilities with Small Prime Difference
- Marián Kühnel
- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k)
- Zoya Dyka, Peter Langendoerfer and Frank Vater
- Broadcast Attacks against Code-Based Schemes
- Robert Niebuhr and Pierre-Louis Cayrel
- On the Security of Hummingbird-2 against Side Channel Cube Attacks
- Xinxin Fan and Guang Gong
- Full Lattice Basis Reduction on Graphics Cards
- Timo Bartkewitz and Tim Güneysu
- Breaking DVB-CSA
- Isbn
- 9783642341588
- Label
- Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers
- Title
- Research in cryptology
- Title remainder
- 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers
- Statement of responsibility
- Frederik Armknecht, Stefan Lucks (eds.)
- Title variation
- WEWoRC 2011
- Subject
-
- Computer Science
- Computer Systems Organization and Communication Networks
- Computer network architectures.
- Computer science.
- Conference papers and proceedings
- Conference papers and proceedings
- Data Encryption
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Data protection.
- Discrete Mathematics in Computer Science
- Discrete Mathematics in Computer Science.
- Informatique
- Math Applications in Computer Science
- Symbolic and Algebraic Manipulation
- Systems and Data Security
- Systems and Data Security.
- Computational complexity.
- Language
- eng
- Summary
- This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation
- Cataloging source
- GW5XE
- Dewey number
- 005.8/2
- Index
- index present
- Language note
- English
- LC call number
- QA76.9.A25
- LC item number
- W47 2011
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2011
- http://bibfra.me/vocab/lite/meetingName
- Western European Workshop on Research in Cryptology
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
-
- Armknecht, Frederik
- Lucks, Stefan
- Series statement
-
- Lecture notes in computer science,
- LNCS sublibrary. SL 4, Security and cryptology
- Series volume
- 7242
- http://library.link/vocab/subjectName
-
- Data encryption (Computer science)
- Computer Science
- Data Encryption
- Systems and Data Security
- Discrete Mathematics in Computer Science
- Symbolic and Algebraic Manipulation
- Computer Systems Organization and Communication Networks
- Math Applications in Computer Science
- Informatique
- Data encryption (Computer science)
- Label
- Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and author index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Erik Tews, Julian Wälde and Michael Weiner
- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
- Michelle Kendall and Keith M. Martin
- [Camma]-MAC[H2P] -- A New Universal MAC Scheme
- Ewan Fleischmann, Christian Forler and Stefan Lucks
- New Universal Hash Functions
- Aysajan Abidin and Jan-Åke Larsson
- Cryptanalysis of TWIS Block Cipher
- Onur Koçak and Neşe Öztop
- RSA Vulnerabilities with Small Prime Difference
- Marián Kühnel
- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k)
- Zoya Dyka, Peter Langendoerfer and Frank Vater
- Broadcast Attacks against Code-Based Schemes
- Robert Niebuhr and Pierre-Louis Cayrel
- On the Security of Hummingbird-2 against Side Channel Cube Attacks
- Xinxin Fan and Guang Gong
- Full Lattice Basis Reduction on Graphics Cards
- Timo Bartkewitz and Tim Güneysu
- Breaking DVB-CSA
- Control code
- 814275050
- Dimensions
- unknown
- Extent
- 1 online resource.
- File format
- unknown
- Form of item
- online
- Isbn
- 9783642341588
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-34159-5
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)814275050
- Label
- Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and author index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Erik Tews, Julian Wälde and Michael Weiner
- On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks
- Michelle Kendall and Keith M. Martin
- [Camma]-MAC[H2P] -- A New Universal MAC Scheme
- Ewan Fleischmann, Christian Forler and Stefan Lucks
- New Universal Hash Functions
- Aysajan Abidin and Jan-Åke Larsson
- Cryptanalysis of TWIS Block Cipher
- Onur Koçak and Neşe Öztop
- RSA Vulnerabilities with Small Prime Difference
- Marián Kühnel
- Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k)
- Zoya Dyka, Peter Langendoerfer and Frank Vater
- Broadcast Attacks against Code-Based Schemes
- Robert Niebuhr and Pierre-Louis Cayrel
- On the Security of Hummingbird-2 against Side Channel Cube Attacks
- Xinxin Fan and Guang Gong
- Full Lattice Basis Reduction on Graphics Cards
- Timo Bartkewitz and Tim Güneysu
- Breaking DVB-CSA
- Control code
- 814275050
- Dimensions
- unknown
- Extent
- 1 online resource.
- File format
- unknown
- Form of item
- online
- Isbn
- 9783642341588
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-34159-5
- Quality assurance targets
- not applicable
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)814275050
Subject
- Computer Science
- Computer Systems Organization and Communication Networks
- Computer network architectures.
- Computer science.
- Conference papers and proceedings
- Conference papers and proceedings
- Data Encryption
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science)
- Data encryption (Computer science) -- Congresses
- Data protection.
- Discrete Mathematics in Computer Science
- Discrete Mathematics in Computer Science.
- Informatique
- Math Applications in Computer Science
- Symbolic and Algebraic Manipulation
- Systems and Data Security
- Systems and Data Security.
- Computational complexity.
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Research-in-cryptology--4th-Western-European/4l52cBDIrC4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Research-in-cryptology--4th-Western-European/4l52cBDIrC4/">Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Research-in-cryptology--4th-Western-European/4l52cBDIrC4/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Research-in-cryptology--4th-Western-European/4l52cBDIrC4/">Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers, Frederik Armknecht, Stefan Lucks (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>