Codes, cryptology and information se...
C2SI (Conference) (2019 :)

Linked to FindBook      Google Book      Amazon      博客來     
  • Codes, cryptology and information security = third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019 : proceedings; in honor of Said El Hajji /
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Codes, cryptology and information security/ edited by Claude Carlet ... [et al.].
    Reminder of title: third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019 : proceedings; in honor of Said El Hajji /
    remainder title: C2SI 2019
    other author: Carlet, Claude.
    corporate name: C2SI (Conference)
    Published: Cham :Springer International Publishing : : 2019.,
    Description: xix, 482 p. :ill. (some col.), digital ;24 cm.
    [NT 15003449]: Side-channel analysis -- Virtual Security Evaluation -- Cache-Timing Attacks still threaten IoT devices -- Speed-up of SCA attacks on 32-bit multiplications. Cryptography -- Arabic Cryptography and Steganography in Morocco -- An AEAD variant of the Grain stream cipher -- Construction for a Nominative Signature Scheme from Lattice with Enhanced Security -- Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG -- A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem -- Non-Interactive Zero Knowledge Proofs in the Random Oracle Model -- From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions -- Secret sharing -- Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments -- Secret Sharing using Near-MDS Codes -- Mathematics for cryptography -- On Plateaued Functions, Linear Structures and Permutation Polynomials -- Faster Scalar Multiplication on the x-line: Three-dimensional GLV Method with Three-dimensional Differential Addition Chains -- Codes and their applications -- On good polynomials over finite fields for optimal locally recoverable codes -- A New Gabidulin-like Code and its Application in Cryptography -- Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum π-distance 3 -- Quasi-Dyadic Girault Identification Scheme -- Homomorphic encryption -- Securely aggregating testimonies with Threshold Multi-key FHE -- Improved Efficiency of a Linearly Homomorphic Cryptosystem -- Applied cryptography -- On the Tracing Traitors Math Dedicated to the memory of Bob Blakley - pioneer of digital fingerprinting and inventor of secret sharing -- Reusable Garbled Turing Machines without FHE -- An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness -- A Practical and Insider Secure Signcryption with Non-Interactive Non-Repudiation -- Security -- Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems -- Managing Your Kleptographic Subscription Plan -- Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification.
    Contained By: Springer Nature eBook
    Subject: Data encryption (Computer science) - Congresses. -
    Online resource: https://doi.org/10.1007/978-3-030-16458-4
    ISBN: 9783030164584
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9403833 電子資源 11.線上閱覽_V 電子書 EB QA76.9.A25 C2 2019 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login