HOME > Detail View

Detail View

Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings

Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings

Material type
단행본
Personal Author
Matsui, Mitsuru.
Title Statement
Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings / Mitsuru Matsui (ed.).
Publication, Distribution, etc
Berlin ;   New York :   Springer,   c2009.  
Physical Medium
xiv, 722 p. : ill. ; 24 cm.
Series Statement
Lecture notes in computer science,0302-9743 ; 5912
ISBN
9783642103650 (pbk. : acid-free paper) 3642103650 (pbk. : acid-free paper)
Bibliography, Etc. Note
Includes bibliographical references and index.
Subject Added Entry-Topical Term
Computer security --Congresses. Cryptography --Congresses.
000 00000cam u2200205 a 4500
001 000046045760
005 20200911103549
008 200911s2009 gw a b 101 0 eng d
010 ▼a 2009938634
015 ▼a 09,N45,0001 ▼2 dnb
020 ▼a 9783642103650 (pbk. : acid-free paper)
020 ▼a 3642103650 (pbk. : acid-free paper)
035 ▼a (KERIS)REF000016317349
040 ▼a OHX ▼b eng ▼c OHX ▼d OCLCQ ▼d YDXCP ▼d AZS ▼d GBVCP ▼d BWX ▼d DEBBG ▼d OCL ▼d DLC ▼d 211009
050 0 0 ▼a QA76.9.A25 ▼b I555 2009
082 0 4 ▼a 005.82 ▼2 23
084 ▼a 005.82 ▼2 DDCK
090 ▼a 005.82 ▼b I613a ▼c 15
111 2 ▼a International Conference on the Theory and Application of Cryptology and Information Security ▼n (15th : ▼d 2009 : ▼c Tokyo, Japan)
245 1 0 ▼a Advances in cryptology - ASIACRYPT 2009 : ▼b 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings / ▼c Mitsuru Matsui (ed.).
260 ▼a Berlin ; ▼a New York : ▼b Springer, ▼c c2009.
300 ▼a xiv, 722 p. : ▼b ill. ; ▼c 24 cm.
490 1 ▼a Lecture notes in computer science, ▼x 0302-9743 ; ▼v 5912
490 1 ▼a LNCS sublibrary: SL 4-security and cryptology
504 ▼a Includes bibliographical references and index.
650 0 ▼a Computer security ▼v Congresses.
650 0 ▼a Cryptography ▼v Congresses.
700 1 ▼a Matsui, Mitsuru.
830 0 ▼a Lecture notes in computer science ; ▼v 5912.
830 0 ▼a LNCS sublibrary. ▼n SL 4 ▼p Security and cryptology.
945 ▼a KLPA

Holdings Information

No. Location Call Number Accession No. Availability Due Date Make a Reservation Service
No. 1 Location Science & Engineering Library/Sci-Info(Stacks2)/ Call Number 005.82 I613a 15 Accession No. 521005228 Availability Available Due Date Make a Reservation Service B M

Contents information

Table of Contents

Block Ciphers.- Related-Key Cryptanalysis of the Full AES-192 and AES-256.- The Key-Dependent Attack on Block Ciphers.- Cascade Encryption Revisited.- Quantum and Post-Quantum.- Quantum-Secure Coin-Flipping and Applications.- On the Power of Two-Party Quantum Cryptography.- Security Bounds for the Design of Code-Based Cryptosystems.- Hash Functions I.- Rebound Attack on the Full Lane Compression Function.- Rebound Distinguishers: Results on the Full Whirlpool Compression Function.- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners.- The Intel AES Instructions Set and the SHA-3 Candidates.- Encryption Schemes.- Group Encryption: Non-interactive Realization in the Standard Model.- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.- Hierarchical Predicate Encryption for Inner-Products.- Hedged Public-Key Encryption: How to Protect against Bad Randomness.- Multi Party Computation.- Secure Two-Party Computation Is Practical.- Secure Multi-party Computation Minimizing Online Rounds.- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols.- Cryptographic Protocols.- Non-malleable Statistically Hiding Commitment from Any One-Way Function.- Proofs of Storage from Homomorphic Identification Protocols.- Simple Adaptive Oblivious Transfer without Random Oracle.- Hash Functions II.- Improved Generic Algorithms for 3-Collisions.- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.- How to Confirm Cryptosystems Security: The Original Merkle-Damgard Is Still Alive!.- Models and Frameworks I.- On the Analysis of Cryptographic Assumptions in the Generic Ring Model.- Zero Knowledge in the Random Oracle Model, Revisited.- A Framework for Universally Composable Non-committing Blind Signatures.- Cryptanalysis: Sqaure and Quadratic.- Cryptanalysis of the Square Cryptosystems.- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses.- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?.- Models and Frameworks II.- Security Notions and Generic Constructions for Client Puzzles.- Foundations of Non-malleable Hash and One-Way Functions.- Hash Functions III.- Improved Cryptanalysis of Skein.- Linearization Framework for Collision Attacks: Application to CubeHash and MD6.- Preimages for Step-Reduced SHA-2.- Lattice-Based.- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures.- Efficient Public Key Encryption Based on Ideal Lattices.- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices.- Side Channels.- PSS Is Secure against Random Fault Attacks.- Cache-Timing Template Attacks.- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.- Signature Schemes with Bounded Leakage Resilience.

New Arrivals Books in Related Fields