Progress in Cryptology - AFRICACRYPT 2014 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings /

This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented  together with 1 invited talk were carefully reviewed and selected...

Full description

Bibliographic Details
Published in:Springer eBooks
Corporate Author: SpringerLink (Online service)
Other Authors: Pointcheval, David (Editor), Vergnaud, Damien (Editor)
Format: eBook
Language:English
Published: Cham : Springer International Publishing : Imprint: Springer, 2014.
Series:Lecture Notes in Computer Science,
Subjects:
Online Access:http://dx.doi.org/10.1007/978-3-319-06734-6
Перейти в каталог НБ ТГУ
LEADER 05063nam a22006015i 4500
001 vtls000543333
003 RU-ToGU
005 20210922082556.0
007 cr nn 008mamaa
008 160915s2014 gw | s |||| 0|eng d
020 |a 9783319067346  |9 978-3-319-06734-6 
024 7 |a 10.1007/978-3-319-06734-6  |2 doi 
035 |a to000543333 
039 9 |y 201609152204  |z Александр Эльверович Гилязов 
040 |a Springer  |c Springer  |d RU-ToGU 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a UTN  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Progress in Cryptology - AFRICACRYPT 2014  |h electronic resource  |b 7th International Conference on Cryptology in Africa, Marrakesh, Morocco, May 28-30, 2014. Proceedings /  |c edited by David Pointcheval, Damien Vergnaud. 
260 |a Cham :  |b Springer International Publishing :  |b Imprint: Springer,  |c 2014.  |9 742221 
300 |a XIV, 476 p. 92 illus.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 8469 
505 0 |a New Results for Rank-Based Cryptography -- Public-Key Cryptography -- Proxy Re-Encryption Scheme Supporting a Selection of Delegatees -- Trapdoor Privacy in Asymmetric Searchable Encryption Schemes -- Kurosawa-Desmedt Key Encapsulation Mechanism, Revisited -- Hash Functions -- Differential Biases in Reduced-Round Keccak -- Practical Distinguishers against 6-Round Keccak-f Exploiting Self-Symmetry -- Preimage Attacks on Reduced-Round Stribog -- Secret-Key Cryptanalysis -- Breaking the IOC Authenticated Encryption Mode -- New Treatment of the BSW Sampling and Its Applications to Stream Ciphers -- Multidimensional Zero-Correlation Linear Cryptanalysis of E2 -- Public-Key Cryptanalysis and Number Theory Further Improvement of Factoring RSA Moduli with Implicit Hint -- New Attacks on the RSA Cryptosystem -- Formulae for Computation of Tate Pairing on Hyperelliptic Curve Using Hyperelliptic Nets -- Hardware Implementation -- New Speed Records for Montgomery Modular Multiplication on 8-bit AVR Microcontrollers -- Minimizing S-Boxes in Hardware by Utilizing Linear Transformations -- Efficient Masked S-Boxes Processing - A Step Forward -- A More Efficient AES Threshold Implementation -- Protocols -- Constant Rounds Almost Linear Complexity Multi-party Computation for Prefix Sum -- Position-Based Cryptography from Noisy Channels -- Lattice-Based Cryptography -- A Comparison of the Homomorphic Encryption Schemes FV and YASHE -- Towards Lattice Based Aggregate Signatures -- Public-Key Cryptography -- A Second Look at Fischlin's Transformation -- Anonymous IBE from Quadratic Residuosity with Improved Performance -- Expressive Attribute Based Signcryption with Constant-Size Ciphertext -- Secret-Key Cryptography.-DRECON: DPA Resistant Encryption by Construction -- Counter-bDM: A Provably Secure Family of Multi-Block-Length Compression Functions -- Universal Hash-Function Families: From Hashing to Authentication. 
520 |a This book constitutes the refereed proceedings of the 7th International Conference on the Theory and Application of Cryptographic Techniques in Africa, AFRICACRYPT 2014, held in Marrakesh, Morocco in May 2014. The 26 papers presented  together with 1 invited talk were carefully reviewed and selected from 83 submissions. The aim of Africacrypt 2014 is to provide an international forum for practitioners and researchers from industry, academia and government from all over the world for a wide ranging discussion of all forms of cryptography and its applications as follows: Public-Key Cryptography, Hash Functions, Secret-Key Cryptanalysis, Number Theory, Hardware Implementation, Protocols, and Lattice-based Cryptography. 
650 0 |a Computer Science.  |9 155490 
650 0 |a Data protection.  |9 303937 
650 0 |a Data encryption (Computer science).  |9 566260 
650 0 |a Coding theory.  |9 303096 
650 0 |a Electronic data processing.  |9 303503 
650 0 |a Information systems.  |9 303226 
650 1 4 |a Computer Science.  |9 155490 
650 2 4 |a Systems and Data Security.  |9 303939 
650 2 4 |a Data Encryption.  |9 566261 
650 2 4 |a Coding and Information Theory.  |9 303101 
650 2 4 |a Numeric Computing.  |9 303733 
650 2 4 |a Computation by Abstract Devices.  |9 305111 
650 2 4 |a Management of Computing and Information Systems.  |9 303227 
700 1 |a Pointcheval, David.  |e editor.  |9 320567 
700 1 |a Vergnaud, Damien.  |e editor.  |9 449561 
710 2 |a SpringerLink (Online service)  |9 143950 
773 0 |t Springer eBooks 
830 0 |a Lecture Notes in Computer Science,  |9 279505 
856 4 0 |u http://dx.doi.org/10.1007/978-3-319-06734-6 
856 |y Перейти в каталог НБ ТГУ  |u https://koha.lib.tsu.ru/cgi-bin/koha/opac-detail.pl?biblionumber=400805 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
950 |a Computer Science (Springer-11645) 
999 |c 400805  |d 400805