000 | 05069cam a22003857a 4500 | ||
---|---|---|---|
001 | 19137700 | ||
003 | OSt | ||
005 | 20210930192634.0 | ||
008 | 160615s2012 gw ac b 011 0 eng d | ||
010 | _a 2012931225 | ||
020 | _a978118545263 | ||
020 | _a978118545263 | ||
035 | _a(OCoLC)ocn775403190 | ||
040 |
_aBTCTA _beng _cBTCTA _dOHX _dYDXCP _dBWX _dMUU _dOCLCF _dOCLCQ _dDLC |
||
042 | _alccopycat | ||
050 | 0 | 0 |
_aQA76.9.A25 _bS59 2013 |
082 | 0 | 4 |
_a005.8/2 _223 |
245 | 0 | 0 |
_aCryptography and security _cC K Shyamala, N harini, T R Padmanabhan. |
260 |
_aHeidelberg ; _aNew Delhi : _bWiley India Pvt. Ltd, _c2013 |
||
300 |
_avi, 527 p. : _bill., portraits ; _c24 cm. |
||
490 | 1 |
_aLecture notes in computer science, _x0302-9743 ; _v6805 |
|
490 | 1 | _aLNCS sublibrary. SL 4, Security and cryptology | |
504 | _aIncludes bibliographical references and index. | ||
505 | 0 | _aThe hidden side of Jean-Jacques Quisquater / Michaël Quisquater -- On Quisquater's multiplication algorithm / Marc Joye -- A brief survey of research jointly with Jean-Jacques Cascaded / Yvo Desmedt -- DES collisions revisited / Sebastiaan Indesteege and Bart Preneel -- Line directed hypergraphs / Jean-Claude Bermond, Fahir Ergincan, and Michel Syska -- Random permutation statistics and an improved slide-determine attack on KeeLoq / Nicolas T. Courtois and Gregory V. Bard -- Self-similarity attacks on block ciphers and application to KeeLoq / Nicolas T. Courtois -- Increasing block sizes using Feistel networks: the example of the AES / Jacques Patarin, Benjamin Gittins, and Joana Treger -- Authenticated-encryption with padding: a formal security treatment / Kenneth G. Paterson and Gaven J. Watson -- Traceable signature with stepping capabilities / Olivier Blazy and David Pointcheval -- Deniable RSA signature: the raise and fall of Ali Baba / Serge Vaudenay -- Autotomic signatures / David Naccache and David Pointecheval -- Fully forward-secure group signatures / Benoît Libert and Moti Yung -- Public key encryption for the forgetful / Pu wen Wei, Yulang Zheng, and Xiaoyn Wang -- Supplemental access control (PACE v2): security analysis of PACE integrated mapping / Jean-Sébastien Coron, Aline Gouget, Thomas Icart, and Pascal Paillier -- Secret key leakage from public key perturbation of DLP-based cryptosystems / Alexandre Berzati, Cécile Canovas-Dumas, and Louis Goubin -- EM probes characterisation for security analysis / Benjamin Mounier, Anne-Lise Ribotta, Jacques Fournier, Michel Agoyan, and Assia Tria -- An updated survey on secure ECC implementations: attacks, countermeasures and cost / Junfeng Fan and Ingrid Verbauwhede -- Masking with randomized look up tables: towards preventing side-channel attacks of all orders / Franc̦ois-Xavier Standaert, Christophe Petit, and Nicolas Veyrat-Charvillon -- Efficient implementation of true random number generator based on SRAM PUFs / Vincent van der Leest, Erik van der Sluis, Geert-Jan Schrijen, Pim Tuyls, and Helena Handschuh -- Operand folding hardware multipliers / Byungchun Chung, Sandra Marcello, Amir-Pasha Mirbaha, David Naccache, and Karim Sabeg -- SIMPL systems as a keyless cryptographic and security primitive / Ulrich Rührmair -- Cryptography with asynchronous logic automata / Peter Schmidt-Nielsen, Kailiang Chen, Jonathan Bachrach, Scott Greenwald, Forrest Green, and Neil Gershenfeld -- A qualitative security analysis of a new class of 3-D integrated crypto co-processors / Jonathan Valamehr, Ted Huffmire, Cynthia Irvine, Ryan Kastner, C̦etin Kaya Koc̦, Timothy Levin, and Timothy Sherwood -- The challenges raised by the privacy-preserving identity card / Yves Deswarte and Sébastien Gambs -- The next smart card nightmare: logical attacks, combined attacks, mutant applications and other funny things / Guillaume Bouffard and Jean-Louis Lanet -- Localization privacy / Mike Burmester -- Dynamic secure cloud storage with provenance / Sherman S.M. Chow, Cheng-Kang Chu, Xinyi Huang, Jianying Zhou, and Robert H. Deng -- Efficient encryption and storage of close distance messages with applications to cloud storage / George Davida and Yair Frankel -- A Nagell algorithm in any characteristic / Mehdi Tibouchi -- How to read a signature? / Vanessa Gratzer and David Naccache -- Fooling a liveness-detecting capacitive fingerprint scanner / Edwin Bowden-Peters, Raphael C.-W. Phan, John N. Whitley, and David J. Parish -- Physical simulation of inarticulate robots / Guillaume Claret, Michaël Mathieu, David Naccache, and Guillaume Seguin. | |
650 | 0 | _aData encryption (Computer science) | |
650 | 0 | _aComputer security. | |
650 | 7 |
_aComputer security. _2fast _0(OCoLC)fst00872484 |
|
650 | 7 |
_aData encryption (Computer science) _2fast _0(OCoLC)fst00887935 |
|
700 | 1 |
_aNaccache, David, _d1967- |
|
830 | 0 |
_aLecture notes in computer science ; _v6805. |
|
830 | 0 |
_aLNCS sublibrary. _nSL 4, _pSecurity and cryptology. |
|
906 |
_a7 _bcbc _ccopycat _d2 _encip _f20 _gy-gencatlg |
||
942 |
_2lcc _cBK |
||
999 |
_c2828 _d2828 |