HOME > 상세정보

상세정보

Advances in cryptology -- ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings

Advances in cryptology -- ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings

자료유형
단행본
개인저자
Abe, Masayuki.
서명 / 저자사항
Advances in cryptology -- ASIACRYPT 2010 : 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings / Masayuki Abe (ed.).
발행사항
Berlin ;   New York :   Springer,   c2010.  
형태사항
xiv, 634 p. : ill. ; 24 cm.
총서사항
Lecture notes in computer science,0302-9743 ; 6477
ISBN
9783642173721 (pbk. : acid-free paper) 3642173721 (pbk. : acid-free paper)
서지주기
Includes bibliographical references and index.
일반주제명
Computer security --Congresses. Cryptography --Congresses.
000 00000cam u2200205 a 4500
001 000046044820
005 20200910153611
008 200902s2010 gw a b 101 0 eng d
010 ▼a 2010939472
020 ▼a 9783642173721 (pbk. : acid-free paper)
020 ▼a 3642173721 (pbk. : acid-free paper)
035 ▼a (KERIS)REF000017103749
040 ▼a OHX ▼c OHX ▼d YDXCP ▼d AZS ▼d UKMGB ▼d BWX ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b I555 2010
082 0 4 ▼a 005.8/2 ▼2 23
084 ▼a 005.82 ▼2 DDCK
090 ▼a 005.82 ▼b I613a ▼c 16
111 2 ▼a International Conference on the Theory and Application of Cryptology and Information Security ▼n (16th : ▼d 2010 : ▼c Singapore)
245 1 0 ▼a Advances in cryptology -- ASIACRYPT 2010 : ▼b 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5-9, 2010 : proceedings / ▼c Masayuki Abe (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2010.
300 ▼a xiv, 634 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 6477
490 1 ▼a LNCS sublibrary: SL 4-security and cryptology
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Abe, Masayuki.
830 0 ▼a Lecture notes in computer science ; ▼v 6477.
830 0 ▼a LNCS sublibrary. ▼n SL 4 ▼p Security and cryptology.
945 ▼a KLPA

소장정보

No. 소장처 청구기호 등록번호 도서상태 반납예정일 예약 서비스
No. 1 소장처 과학도서관/Sci-Info(2층서고)/ 청구기호 005.82 I613a 16 등록번호 521005090 도서상태 대출가능 반납예정일 예약 서비스 B M

컨텐츠정보

목차

Hash Attacks.- Rotational Rebound Attacks on Reduced Skein.- Finding Second Preimages of Short Messages for Hamsi-256.- Non-full-active Super-Sbox Analysis: Applications to ECHO and Grostl.- Advanced Meet-in-the-Middle Preimage Attacks: First Results on Full Tiger, and Improved Results on MD4 and SHA-2.- Collision Attacks against the Knudsen-Preneel Compression Functions.- Symmetric-Key Cryptosystems.- Improved Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.- The World Is Not Enough: Another Look on Second-Order DPA.- Block and Stream Ciphers.- Conditional Differential Cryptanalysis of NLFSR-Based Cryptosystems.- A Byte-Based Guess and Determine Attack on SOSEMANUK.- Improved Single-Key Attacks on 8-Round AES-192 and AES-256.- Protocols.- Constant-Size Commitments to Polynomials and Their Applications.- Computationally Secure Pattern Matching in the Presence of Malicious Adversaries.- Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model.- Key Exchange.- Generic Compilers for Authenticated Key Exchange.- A Forward-Secure Symmetric-Key Derivation Protocol.- Foundation.- Efficient String-Commitment from Weak Bit-Commitment.- On the Static Diffie-Hellman Problem on Elliptic Curves over Extension Fields.- Random Oracles with(out) Programmability.- Zero-Knowledge.- Short Pairing-Based Non-interactive Zero-Knowledge Arguments.- Short Non-interactive Zero-Knowledge Proofs.- Optimistic Concurrent Zero Knowledge.- Lattice-Based Cryptography.- Faster Fully Homomorphic Encryption.- A Group Signature Scheme from Lattice Assumptions.- Lattice-Based Blind Signatures.- Secure Communication and Computation.- The Round Complexity of Verifiable Secret Sharing: The Statistical Case.- General Perfectly Secure Message Transmission Using Linear Codes.- On Invertible Sampling and Adaptive Security.- Multiparty Computation for Modulo Reduction without Bit-Decomposition and a Generalization to Bit-Decomposition.- Models, Notions, and Assumptions.- A Closer Look at Anonymity and Robustness in Encryption Schemes.- Limitations on Transformations from Composite-Order to Prime-Order Groups: The Case of Round-Optimal Blind Signatures.- The Semi-Generic Group Model and Applications to Pairing-Based Cryptography.- Public-Key Encryption.- The Degree of Regularity of HFE Systems.- Structured Encryption and Controlled Disclosure.- Leakage Resilient ElGamal Encryption.- Efficient Public-Key Cryptography in the Presence of Key Leakage.

관련분야 신착자료

이창현 (2021)