HOME > Detail View

Detail View

Cryptography and coding : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings

Cryptography and coding : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings

Material type
단행본
Personal Author
Smart, Nigel P. (Nigel Paul), 1967-.
Title Statement
Cryptography and coding : 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings / Nigel P. Smart (ed.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2005.  
Physical Medium
xi, 459 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 3796
ISBN
354030276X (pbk. : alk. paper) 9783540302766 (pbk. : alk. paper)
General Note
Also issued online.
Bibliography, Etc. Note
Includes bibliographical references and index.
이용가능한 다른형태자료
Also issued online.  
Subject Added Entry-Topical Term
Coding theory -- Congresses. Cryptography -- Congresses.
000 01790camuu2200409 a 4500
001 000045561476
005 20091125140853
008 051026s2005 gw a b 101 0 eng d
010 ▼a 2005936359
015 ▼a GBA618475 ▼2 bnb
016 7 ▼a 013389550 ▼2 Uk
020 ▼a 354030276X (pbk. : alk. paper)
020 ▼a 9783540302766 (pbk. : alk. paper)
035 ▼a (OCoLC)ocm62972637
035 ▼a (OCoLC)62972637
035 ▼a (KERIS)REF000012658810
040 ▼a LWU ▼c LWU ▼d OHX ▼d UKM ▼d C$Q ▼d BAKER ▼d DLC ▼d 211009
042 ▼a lccopycat
050 0 0 ▼a QA268 ▼b .I45 2005
082 0 0 ▼a 005.82 ▼2 22
090 ▼a 005.82 ▼b I31c ▼c 10
111 2 ▼a IMA International Conference ▼n (10th : ▼d 2005 : ▼c Cirencester, England)
245 1 0 ▼a Cryptography and coding : ▼b 10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings / ▼c Nigel P. Smart (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2005.
300 ▼a xi, 459 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 3796
504 ▼a Includes bibliographical references and index.
530 ▼a Also issued online.
650 0 ▼a Coding theory ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Smart, Nigel P. ▼q (Nigel Paul), ▼d 1967-.
830 0 ▼a Lecture notes in computer science ; ▼v 3796.
945 ▼a KINS

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 I31c 10 Accession No. 121186723 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Invited Papers.- Abstract Models of Computation in Cryptography.- Pairing-Based Cryptography at High Security Levels.- Improved Decoding of Interleaved AG Codes.- Coding Theory.- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics.- A Trellis-Based Bound on (2,1)-Separating Codes.- Tessellation Based Multiple Description Coding.- Exploiting Coding Theory for Collision Attacks on SHA-1.- Signatures and Signcryption.- Hash Based Digital Signature Schemes.- A General Construction for Simultaneous Signing and Encrypting.- Non-interactive Designated Verifier Proofs and Undeniable Signatures.- Symmetric Cryptography.- Partial Key Recovery Attacks on XCBC, TMAC and OMAC.- Domain Expansion of MACs: Alternative Uses of the FIL-MAC.- Normality of Vectorial Functions.- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.- Side Channels.- The Physically Observable Security of Signature Schemes.- On the Automatic Construction of Indistinguishable Operations.- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods.- Algebraic Cryptanalysis.- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem.- An Algebraic Framework for Cipher Embeddings.- Probabilistic Algebraic Attacks.- Information Theoretic Applications.- Unconditionally Secure Information Authentication in Presence of Erasures.- Generalized Strong Extractors and Deterministic Privacy Amplification.- On Threshold Self-healing Key Distribution Schemes.- Number Theoretic Foundations.- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator.- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited.- Pairings on Elliptic Curves over Finite Commutative Rings.- Public Key and ID-Based Encryption Schemes.- A Key Encapsulation Mechanism for NTRU.- Efficient Identity-Based Key Encapsulation to Multiple Parties.- Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme.


Information Provided By: : Aladin

New Arrivals Books in Related Fields