000 | 05505nam a22005535i 4500 | ||
---|---|---|---|
001 | u374324 | ||
003 | SIRSI | ||
005 | 20160812084229.0 | ||
007 | cr nn 008mamaa | ||
008 | 100429s2010 gw | s |||| 0|eng d | ||
020 |
_a9783642126789 _9978-3-642-12678-9 |
||
040 | _cMX-MeUAM | ||
050 | 4 | _aQA76.9.A25 | |
082 | 0 | 4 |
_a005.82 _223 |
100 | 1 |
_aBernstein, Daniel J. _eeditor. |
|
245 | 1 | 0 |
_aProgress in Cryptology – AFRICACRYPT 2010 _h[recurso electrónico] : _bThird International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010. Proceedings / _cedited by Daniel J. Bernstein, Tanja Lange. |
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2010. |
|
300 |
_aXIII, 437p. 43 illus. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6055 |
|
505 | 0 | _aSignatures -- A New RSA-Based Signature Scheme -- Fair Blind Signatures without Random Oracles -- Fair Partially Blind Signatures -- Attacks -- Parallel Shortest Lattice Vector Enumeration on Graphics Cards -- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over -- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits -- Protocols -- Proofs of Restricted Shuffles -- Batch Range Proof for Practical Small Ranges -- Optimistic Fair Priced Oblivious Transfer -- Networks -- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes -- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes -- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience -- Elliptic Curves -- Avoiding Full Extension Field Arithmetic in Pairing Computations -- ECC2K-130 on Cell CPUs -- Side-Channel Attacks and Fault Attacks -- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator -- Differential Fault Analysis of HC-128 -- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices -- Public-Key Encryption -- Strong Cryptography from Weak Secrets -- Efficient Unidirectional Proxy Re-Encryption -- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions -- Keys and PUFs -- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys -- Quantum Readout of Physical Unclonable Functions -- Ciphers and Hash Functions -- Parallelizing the Camellia and SMS4 Block Ciphers -- Improved Linear Differential Attacks on CubeHash -- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512. | |
520 | _aAfricacrypt 2010, the Third International Conference on Cryptology in Africa, took place May 3–6, 2010 in Stellenbosch, South Africa. The General Chairs, Riaal Domingues from the South African Communications and Security Agency and Christine Swart from the University of Cape Town, were always a pleasure to work with and did an outstanding job with the local arrangements. We are deeplythankfulthat theyagreedto hostAfricacrypt2010with onlyfour months notice after unanticipated events forced a change of location. The Africacrypt 2010 submission deadline was split into two. Authors s- mitting paperswererequiredto registertitles andabstractsby the ?rstdeadline, January 5. A total of 121 submissions had been received by this deadline, - though some were withdrawn before review. Authors were allowed to continue working on their papers until the second deadline, January 10. Submissions were evaluated in three phases over a period of nearly two months. The selection phase started on January 5: Program Committee m- bers began evaluating abstracts and volunteering to handle various papers. We assigned a team of people to each paper. The review phase started on January 11: Program Committee members were given access to the full papers and - gan in-depth reviews of 82 submissions. Most of the reviews were completed by February7,thebeginningofthediscussionphase.ProgramCommitteemembers were given access to other reviews and built consensus in their evaluations of the submissions. In the end the discussions included 285 full reports and 203 - ditional comments. The submissions, reviews, and subsequent discussions were handled smoothly by iChair. | ||
650 | 0 | _aComputer science. | |
650 | 0 | _aComputer Communication Networks. | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aData protection. | |
650 | 0 | _aData encryption (Computer science). | |
650 | 0 | _aComputer software. | |
650 | 0 | _aInformation Systems. | |
650 | 1 | 4 | _aComputer Science. |
650 | 2 | 4 | _aData Encryption. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aManagement of Computing and Information Systems. |
650 | 2 | 4 | _aAlgorithm Analysis and Problem Complexity. |
650 | 2 | 4 | _aSystems and Data Security. |
650 | 2 | 4 | _aOperating Systems. |
700 | 1 |
_aLange, Tanja. _eeditor. |
|
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer eBooks | |
776 | 0 | 8 |
_iPrinted edition: _z9783642126772 |
830 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v6055 |
|
856 | 4 | 0 |
_zLibro electrónico _uhttp://148.231.10.114:2048/login?url=http://link.springer.com/book/10.1007/978-3-642-12678-9 |
596 | _a19 | ||
942 | _cLIBRO_ELEC | ||
999 |
_c202204 _d202204 |