Coverart for item
The Resource Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers, Ali Miri, Serge Vaudenay (eds.)

Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers, Ali Miri, Serge Vaudenay (eds.)

Label
Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers
Title
Selected areas in cryptography
Title remainder
18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers
Statement of responsibility
Ali Miri, Serge Vaudenay (eds.)
Title variation
SAC 2011
Creator
Contributor
Subject
Genre
Language
eng
Summary
This book constitutes the thoroughly refereed post-conference proceedings of the 18th Annual International Workshop on Selected Areas in Cryptography, SAC 2011, held in Toronto, Canada in August 2011. The 23 revised full papers presented together with 2 invited papers were carefully reviewed and selected from 92 submissions. The papers are organized in topical sections on cryptanalysis of hash functions, security in clouds, bits and randomness, cryptanalysis of ciphers, cryptanalysis of public-key crypthography, cipher implementation, new designs and mathematical aspects of applied cryptography
Member of
Cataloging source
GW5XE
Dewey number
005.8/2
Index
index present
LC call number
QA76.9.A25
LC item number
S23 2011
Literary form
non fiction
http://bibfra.me/vocab/lite/meetingDate
2011
http://bibfra.me/vocab/lite/meetingName
SAC (Conference)
Nature of contents
  • dictionaries
  • bibliography
http://library.link/vocab/relatedWorkOrContributorName
  • Miri, Ali
  • Vaudenay, Serge
Series statement
  • Lecture notes in computer science,
  • LNCS sublibrary. SL 4, Security and cryptology
Series volume
7118
http://library.link/vocab/subjectName
  • Data encryption (Computer science)
  • Data protection
  • Computer security
  • Informatique
  • Computer security
  • Data encryption (Computer science)
  • Data protection
Label
Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers, Ali Miri, Serge Vaudenay (eds.)
Instantiates
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Proof of Empirical RC4 Biases and New Key Correlations
  • Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
  • Practical Attack on the Full MMB Block Cipher
  • Conditional Differential Cryptanalysis of Trivium and KATAN
  • Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
  • Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
  • New Insights on Impossible Differential Cryptanalysis
  • A Unified Framework for Small Secret Exponent Attack on RSA
  • Very Compact Hardware Implementations of the Blockcipher CLEFIA
  • Another Look at Tightness
  • Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL
  • Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
  • Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles
  • ASC-1: An Authenticated Encryption Stream Cipher
  • On Various Families of Twisted Jacobi Quartics
  • Improved Three-Way Split Formulas for Binary Polynomial Multiplication
  • Sublinear Scalar Multiplication on Hyperelliptic Koblitz Curves
  • Faster Hashing to \mathbb G2G2
  • Improved Analysis of ECHO-256
  • Provable Chosen-Target-Forced-Midfix Preimage Resistance
  • On CCA-Secure Somewhat Homomorphic Encryption
  • Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources
  • Group Law Computations on Jacobians of Hyperelliptic Curves
  • Cryptographic Analysis of All 4 x 4-Bit S-Boxes
  • The Cryptographic Power of Random Selection
Control code
778672638
Dimensions
unknown
Extent
1 online resource (xiii, 430 pages).
File format
unknown
Form of item
online
Isbn
9783642284960
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-28496-0
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)778672638
Label
Selected areas in cryptography : 18th International Workshop, SAC 2011, Toronto, ON, Canada, August 11-12, 2011, Revised selected papers, Ali Miri, Serge Vaudenay (eds.)
Publication
Antecedent source
unknown
Bibliography note
Includes bibliographical references and author index
Carrier category
online resource
Carrier category code
  • cr
Carrier MARC source
rdacarrier
Color
multicolored
Content category
text
Content type code
  • txt
Content type MARC source
rdacontent
Contents
  • Proof of Empirical RC4 Biases and New Key Correlations
  • Combined Differential and Linear Cryptanalysis of Reduced-Round PRINTcipher
  • Practical Attack on the Full MMB Block Cipher
  • Conditional Differential Cryptanalysis of Trivium and KATAN
  • Some Instant- and Practical-Time Related-Key Attacks on KTANTAN32/48/64
  • Analysis of the Initial and Modified Versions of the Candidate 3GPP Integrity Algorithm 128-EIA3
  • New Insights on Impossible Differential Cryptanalysis
  • A Unified Framework for Small Secret Exponent Attack on RSA
  • Very Compact Hardware Implementations of the Blockcipher CLEFIA
  • Another Look at Tightness
  • Boomerang Distinguishers on MD4-Family: First Practical Results on Full 5-Pass HAVAL
  • Duplexing the Sponge: Single-Pass Authenticated Encryption and Other Applications
  • Blockcipher-Based Double-Length Hash Functions for Pseudorandom Oracles
  • ASC-1: An Authenticated Encryption Stream Cipher
  • On Various Families of Twisted Jacobi Quartics
  • Improved Three-Way Split Formulas for Binary Polynomial Multiplication
  • Sublinear Scalar Multiplication on Hyperelliptic Koblitz Curves
  • Faster Hashing to \mathbb G2G2
  • Improved Analysis of ECHO-256
  • Provable Chosen-Target-Forced-Midfix Preimage Resistance
  • On CCA-Secure Somewhat Homomorphic Encryption
  • Efficient Schemes for Anonymous Yet Authorized and Bounded Use of Cloud Resources
  • Group Law Computations on Jacobians of Hyperelliptic Curves
  • Cryptographic Analysis of All 4 x 4-Bit S-Boxes
  • The Cryptographic Power of Random Selection
Control code
778672638
Dimensions
unknown
Extent
1 online resource (xiii, 430 pages).
File format
unknown
Form of item
online
Isbn
9783642284960
Level of compression
unknown
Media category
computer
Media MARC source
rdamedia
Media type code
  • c
Other control number
10.1007/978-3-642-28496-0
Quality assurance targets
not applicable
Reformatting quality
unknown
Sound
unknown sound
Specific material designation
remote
System control number
(OCoLC)778672638

Library Locations

    • Ellis LibraryBorrow it
      1020 Lowry Street, Columbia, MO, 65201, US
      38.944491 -92.326012
    • Engineering Library & Technology CommonsBorrow it
      W2001 Lafferre Hall, Columbia, MO, 65211, US
      38.946102 -92.330125
Processing Feedback ...