Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
Resource Information
The instance Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.) represents a material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Instance, Electronic.
The Resource
Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
Resource Information
The instance Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.) represents a material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries. This resource is a combination of several types including: Instance, Electronic.
- Label
- Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
- Title remainder
- 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings
- Statement of responsibility
- Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
- Antecedent source
- unknown
- Bibliography note
- Includes bibliographical references and author index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
-
- Intro; Title; Preface; Table of Contents; Invited Talks; Expressive Encryption Systems from Lattices; Introduction; Background; Lattice Notions; Discrete Gaussians; Sampling and Preimage Sampling; Hardness Assumption; Classic Constructions; Regev Public-Key Encryption; GPV Identity-Based Encryption; Techniques and Refinements; Bit-by-Bit Standard-Model IBE; All-at-Once Standard-Model IBE; Adaptive or F̀̀ull'' Security; Delegation and Hierarchies; Concatenation-Based Delegation; Multiplicative In-Place Delegation; Attributes and Predicates; Conclusion; References
- Breaking Fully-Homomorphic-Encryption ChallengesReferences; Symmetric Cryptanalysis; Cube Cryptanalysis of Hitag2 Stream Cipher; Introduction; Hitag2 Stream Cipher; Cube Attack; Cube Attack on Hitag2; First Phase: Black-Box Attack; Second Phase: White-Box Attack; Third Phase: Exhaustive Search Attack; Experimental Results; Conclusion; References; New Impossible Differential Cryptanalysis of Reduced-Round Camellia; Introduction; Preliminaries; Notations; A Brief Description of Camellia; 7-Round Impossible Differential of Camellia; Impossible Differential Attack on 10-Round Camellia-128
- Attack on 10-Round Camellia-192 and 11-Round Camellia-256Attack on 10-Round Camellia-192; Attack on 11-Round Camellia-256; Conclusion; References; The Initialization Stage Analysis of ZUC v1.5; Introduction; Preliminaries; ZUC v1.5; S-Functions; The Chosen-IV Attack of ZUC v1.5; The Definition of Differences; An Chosen-IV Differential Path of ZUC v1.5; The Differential Properties of Operations in ZUC v1.5; The Probability of the Differential; Conclusion; References; Algebraic Cryptanalysis of the Round-Reduced and Side Channel Analysis of the Full PRINTCipher-48; Introduction; PRINTCipher
- Algebraic DescriptionSAT Techniques for Algebraic System Solving; Conversion Techniques; Optimal Tools and Strategies for the Attacks; Algebraic Analysis of PRINTCipher-48; Attack on Round-Reduced PRINTCipher-48; Additional Bits at Round Four; Side Channel Analysis of the Full PRINTCipher-48; Conclusion and Future Work; References; Symmetric Ciphers; EPCBC -- A Block Cipher Suitable for Electronic Product Code Encryption; Introduction; The Electronic Product Code -- EPC; A New Block Cipher Suitable for EPC Encryption: EPCBC; EPCBC(48,96) -- EPCBC with 48-Bit Block Size and 96-Bit Key Size
- EPCBC(96,96) -- EPCBC with 96-Bit Block Size and 96-Bit Key SizeImproved Differential and Linear Cryptanalyis of PR-n; Brief Description of PR-n; Improved Differential and Linear Cryptanalysis; Security Analysis of EPCBC; Differential, Linear and Related-Key Differential Cryptanalysis; Other Attacks on EPCBC; Implementation of EPCBC; Conclusion; References; On Permutation Layer of Type 1, Source-Heavy, and Target-Heavy Generalized Feistel Structures; Introduction; Preliminaries; Generalized Feistel Structure (GFS); Diffusion of GFS; Equivalence of GFSs; Analysis on DRmax(); Type 1 GFS
- Control code
- 769754682
- Dimensions
- unknown
- Extent
- 1 online resource (xii, 311 pages).
- File format
- unknown
- Form of item
- online
- Isbn
- 9783642255137
- Level of compression
- unknown
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/978-3-642-25513-7
- Quality assurance targets
- not applicable
- Record ID
- .b130018934
- Reformatting quality
- unknown
- Sound
- unknown sound
- Specific material designation
- remote
- System control number
- (OCoLC)769754682
Context
Context of Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/emQxX2JGV_w/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/emQxX2JGV_w/">Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Instance Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/resource/emQxX2JGV_w/" typeof="Book http://bibfra.me/vocab/lite/Instance"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/resource/emQxX2JGV_w/">Cryptology and network security : 10th International Conference, CANS 2011, Sanya, China, December 10-12, 2011, proceedings, Dongdai Lin, Gene Tsudik, Xiaoyun Wang (eds.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>