Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings

Gespeichert in:
Bibliographische Detailangaben
Format: Tagungsbericht Buch
Sprache:English
Veröffentlicht: Berlin [u.a.] Springer 2010
Schriftenreihe:Lecture notes in computer science 6110
Schlagworte:
Online-Zugang:Inhaltstext
Inhaltsverzeichnis
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!

MARC

LEADER 00000nam a2200000 cb4500
001 BV036473588
003 DE-604
005 20100803
007 t|
008 100527s2010 xx d||| |||| 10||| eng d
015 |a 10,N17  |2 dnb 
016 7 |a 1001790642  |2 DE-101 
020 |a 9783642131899  |c PB. : EUR 93.09 (freier Pr.), sfr 135.00 (freier Pr.)  |9 978-3-642-13189-9 
024 3 |a 9783642131899 
028 5 2 |a 80014929 
035 |a (OCoLC)642320694 
035 |a (DE-599)DNB1001790642 
040 |a DE-604  |b ger  |e rakddb 
041 0 |a eng 
049 |a DE-11  |a DE-706  |a DE-83  |a DE-91G 
082 0 |a 005.82  |2 22/ger 
084 |a 004  |2 sdnb 
084 |a DAT 465f  |2 stub 
245 1 0 |a Advances in cryptology  |b 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings  |c EUROCRYPT 2010. Henri Gilbert (ed.) 
264 1 |a Berlin [u.a.]  |b Springer  |c 2010 
300 |a XIV, 694 S.  |b graph. Darst. 
336 |b txt  |2 rdacontent 
337 |b n  |2 rdamedia 
338 |b nc  |2 rdacarrier 
490 1 |a Lecture notes in computer science  |v 6110 
650 0 7 |a Kryptosystem  |0 (DE-588)4209132-9  |2 gnd  |9 rswk-swf 
650 0 7 |a Kryptologie  |0 (DE-588)4033329-2  |2 gnd  |9 rswk-swf 
655 7 |0 (DE-588)1071861417  |a Konferenzschrift  |y 2010  |z Monaco  |2 gnd-content 
689 0 0 |a Kryptologie  |0 (DE-588)4033329-2  |D s 
689 0 |5 DE-604 
689 1 0 |a Kryptosystem  |0 (DE-588)4209132-9  |D s 
689 1 |5 DE-604 
700 1 |a Gilbert, Henri  |e Sonstige  |4 oth 
711 2 |a EUROCRYPT  |n 29  |d 2010  |c Monaco; Nice  |j Sonstige  |0 (DE-588)16068048-7  |4 oth 
830 0 |a Lecture notes in computer science  |v 6110  |w (DE-604)BV000000607  |9 6110 
856 4 2 |q text/html  |u http://deposit.dnb.de/cgi-bin/dokserv?id=3459115&prov=M&dok_var=1&dok_ext=htm  |3 Inhaltstext 
856 4 2 |m DNB Datenaustausch  |q application/pdf  |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020345226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA  |3 Inhaltsverzeichnis 
943 1 |a oai:aleph.bib-bvb.de:BVB01-020345226 

Datensatz im Suchindex

DE-BY-TUM_call_number 0102 DAT 001z 2001 A 999
DE-BY-TUM_katkey 1736777
DE-BY-TUM_location 01
DE-BY-TUM_media_number 040010233555
_version_ 1822409246477647872
adam_text JUAN GARAY, CLINT GIVENS, AND RAFAIL OSTROVSKY TABLE OF CONTENTS CRYPTOSYSTEMS I ON IDEAL LATTICES AND LEARNING WITH ERRORS OVER RINGS 1 VADIM LYUBASHEVSKY, CHRIS PEIKERT, AND ODEA REGEV FULLY HOMOMORPHIC ENCRYPTION OVER THE INTEGERS 24 MARTEN VAN DIJK, CRAIG GENTRY, SHAI HALEVI, AND VINOD VAIKUNTANATHAN CONVERTING PAIRING-BASED CRYPTOSYSTEMS FROM COMPOSITE-ORDER GROUPS TO PRIME-ORDER GROUPS 44 DAVID MANDELL FREEMAN FULLY SECURE FUNCTIONAL ENCRYPTION: ATTRIBUTE-BASED ENCRYPTION AND (HIERARCHICAL) INNER PRODUCT ENCRYPTION 62 ALLISON LEWKO, TATSUAKI OKAMOTO, AMIT SAHAI, KATSUYUKI TAKASHIMA, AND BRENT WATERS OBFUSCATION AND SIDE CHANNEL SECURITY SECURE OBFUSCATION FOR ENCRYPTED SIGNATURES 92 SATOSHI HADA PUBLIC-KEY ENCRYPTION IN THE BOUNDED-RETRIEVAL MODEL 113 JOEL ALWEN, YEVGENIY DODIS, MONI NAOR, GIL SEGEV, SHABSI WOLFISH, AND DANIEL WICHS PROTECTING CIRCUITS FROM LEAKAGE: THE COMPUTATIONALLY-BOUNDED AND NOISY CASES 135 SEBASTIAN FAUST, TAL RABIN, LEONID REYZIN, ERAN TROMER, AND VINOD VAIKUNTANATHAN 2-PARTY PROTOCOLS PARTIAL FAIRNESS IN SECURE TWO-PARTY COMPUTATION 157 S. DOV GORDON AND JONATHAN KATZ SECURE MESSAGE TRANSMISSION WITH SMALL PUBLIC DISCUSSION 177 BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1001790642 DIGITALISIERT DURCH XII TABLE OF CONTENTS ON THE IMPOSSIBILITY OF THREE-MOVE BLIND SIGNATURE SCHEMES 197 MARC FISCHLIN AND DOMINIQUE SCHROEDER EFFICIENT DEVICE-INDEPENDENT QUANTUM KEY DISTRIBUTION 216 ESTHER HAENGGI, RENATO RENNER, AND STEFAN WOLF CRYPTANALYSIS NEW GENERIC ALGORITHMS FOR HARD KNAPSACKS 235 NICK HOWGRAVE-GRAHAM AND ANTOINE JOUX LATTICE ENUMERATION USING EXTREME PRUNING 257 NICOLAS GAMA, PHONG Q. NGUYEN, AND ODED REGEV ALGEBRAIC CRYPTANALYSIS OF MCELIECE VARIANTS WITH COMPACT KEYS 279 JEAN-CHARLES FAUGERE, AYOUB OTMANI, LUDOVIC PERRET, AND JEAN-PIERRE TILLICH KEY RECOVERY ATTACKS OF PRACTICAL COMPLEXITY ON AES-256 VARIANTS WITH UP TO 10 ROUNDS 299 ALEX BIRYUKOV, ORR DUNKELMAN, NATHAN KELLER, DMITRY KHOVRATOVICH, AND ADI SHAMIR 2010 IACR DISTINGUISHED LECTURE CRYPTOGRAPHY BETWEEN WONDERLAND AND UNDERLAND 320 MOTI YUNG AUTOMATED TOOLS AND FORMAL METHODS AUTOMATIC SEARCH FOR RELATED-KEY DIFFERENTIAL CHARACTERISTICS IN BYTE-ORIENTED BLOCK CIPHERS: APPLICATION TO AES, CAMELLIA, KHAZAD AND OTHERS 322 ALEX BIRYUKOV AND IVICA NIKOLIC PLAINTEXT-DEPENDENT DECRYPTION: A FORMAL SECURITY TREATMENT OF SSH-CTR 345 KENNETH G. PATERSON AND GAVEN J. WATSON COMPUTATIONAL SOUNDNESS, CO-INDUCTION, AND ENCRYPTION CYCLES 362 DANIELE TABLE OF CONTENTS XIII CRYPTOGRAPHIE AGILITY AND ITS RELATION TO CIRCULAR ENCRYPTION 403 TOLGA ACAR, MIRA BELENKIY, MIHIR BELLARE, AND DAVID CASH BOUNDED KEY-DEPENDENT MESSAGE SECURITY 423 BOAZ BARAK, IFTACH HAITNER, DENNIS HOFHEINZ, AND YUVAL ISHAI MULTIPARTY PROTOCOLS PERFECTLY SECURE MULTIPARTY COMPUTATION AND THE COMPUTATIONAL OVERHEAD OF CRYPTOGRAPHY 445 IVAN DAMGARD, YUVAL ISHAI, AND MIKKEL KROEIGAARD ADAPTIVELY SECURE BROADCAST 466 MARTIN HIRT AND VASSILIS ZIKAS UNIVERSALLY COMPOSABLE QUANTUM MULTI-PARTY COMPUTATION 486 DOMINIQUE UNRUH CRYPTOSYSTEMS II A SIMPLE BGN-TYPE CRYPTOSYSTEM FROM LWE 506 CRAIG GENTRY, SHAI HALEVI, AND VINOD VAIKUNTANATHAN BONSAI TREES, OR HOW TO DELEGATE A LATTICE BASIS 523 DAVID CASH, DENNIS HOFHEINZ, EIKE KILTZ, AND CHRIS PEIKERT EFFICIENT LATTICE (H)IBE IN THE STANDARD MODEL 553 SHWETA AGRAWAL, DAN BONEH, AND XAVIER BOYEN HASH AND MAC MULTI-PROPERTY-PRESERVING DOMAIN EXTENSION USING POLYNOMIAL-BASED MODES OF OPERATION 573 JOOYOUNG LEE AND JOHN STEINBERGER STAM'S COLLISION RESISTANCE CONJECTURE 597 JOHN STEINBERGER UNIVERSAL ONE-WAY HASH FUNCTIONS VIA INACCESSIBLE ENTROPY 616 IFTACH HAITNER, THOMAS HOLENSTEIN, ORNER REINGOLD, SALII XIV TABLE OF CONTENTS CONSTRUCTING VERIFIABLE RANDOM FUNCTIONS WITH LARGE INPUT SPACES . 656 SUSAN HOHENBERGER AND BRENT WATERS ADAPTIVE TRAPDOOR FUNCTIONS AND CHOSEN-CIPHERTEXT SECURITY 673 EIKE KILTZ, PAYMAN MOHASSEL, AND ADAM O'NEILL AUTHOR INDEX 693
any_adam_object 1
building Verbundindex
bvnumber BV036473588
classification_rvk SS 4800
classification_tum DAT 465f
ctrlnum (OCoLC)642320694
(DE-599)DNB1001790642
dewey-full 005.82
dewey-hundreds 000 - Computer science, information, general works
dewey-ones 005 - Computer programming, programs, data, security
dewey-raw 005.82
dewey-search 005.82
dewey-sort 15.82
dewey-tens 000 - Computer science, information, general works
discipline Informatik
format Conference Proceeding
Book
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036473588</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20100803</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">100527s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N17</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1001790642</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642131899</subfield><subfield code="c">PB. : EUR 93.09 (freier Pr.), sfr 135.00 (freier Pr.)</subfield><subfield code="9">978-3-642-13189-9</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642131899</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">80014929</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)642320694</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1001790642</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-11</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-91G</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.82</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology</subfield><subfield code="b">29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings</subfield><subfield code="c">EUROCRYPT 2010. Henri Gilbert (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 694 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6110</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Monaco</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gilbert, Henri</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">EUROCRYPT</subfield><subfield code="n">29</subfield><subfield code="d">2010</subfield><subfield code="c">Monaco; Nice</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16068048-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6110</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6110</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3459115&amp;prov=M&amp;dok_var=1&amp;dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&amp;doc_library=BVB01&amp;local_base=BVB01&amp;doc_number=020345226&amp;sequence=000001&amp;line_number=0001&amp;func_code=DB_RECORDS&amp;service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020345226</subfield></datafield></record></collection>
genre (DE-588)1071861417 Konferenzschrift 2010 Monaco gnd-content
genre_facet Konferenzschrift 2010 Monaco
id DE-604.BV036473588
illustrated Illustrated
indexdate 2025-01-27T13:34:51Z
institution BVB
institution_GND (DE-588)16068048-7
isbn 9783642131899
language English
oai_aleph_id oai:aleph.bib-bvb.de:BVB01-020345226
oclc_num 642320694
open_access_boolean
owner DE-11
DE-706
DE-83
DE-91G
DE-BY-TUM
owner_facet DE-11
DE-706
DE-83
DE-91G
DE-BY-TUM
physical XIV, 694 S. graph. Darst.
publishDate 2010
publishDateSearch 2010
publishDateSort 2010
publisher Springer
record_format marc
series Lecture notes in computer science
series2 Lecture notes in computer science
spelling Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings EUROCRYPT 2010. Henri Gilbert (ed.)
Berlin [u.a.] Springer 2010
XIV, 694 S. graph. Darst.
txt rdacontent
n rdamedia
nc rdacarrier
Lecture notes in computer science 6110
Kryptosystem (DE-588)4209132-9 gnd rswk-swf
Kryptologie (DE-588)4033329-2 gnd rswk-swf
(DE-588)1071861417 Konferenzschrift 2010 Monaco gnd-content
Kryptologie (DE-588)4033329-2 s
DE-604
Kryptosystem (DE-588)4209132-9 s
Gilbert, Henri Sonstige oth
EUROCRYPT 29 2010 Monaco; Nice Sonstige (DE-588)16068048-7 oth
Lecture notes in computer science 6110 (DE-604)BV000000607 6110
text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3459115&prov=M&dok_var=1&dok_ext=htm Inhaltstext
DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020345226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis
spellingShingle Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings
Lecture notes in computer science
Kryptosystem (DE-588)4209132-9 gnd
Kryptologie (DE-588)4033329-2 gnd
subject_GND (DE-588)4209132-9
(DE-588)4033329-2
(DE-588)1071861417
title Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings
title_auth Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings
title_exact_search Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings
title_full Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings EUROCRYPT 2010. Henri Gilbert (ed.)
title_fullStr Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings EUROCRYPT 2010. Henri Gilbert (ed.)
title_full_unstemmed Advances in cryptology 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings EUROCRYPT 2010. Henri Gilbert (ed.)
title_short Advances in cryptology
title_sort advances in cryptology 29th annual international conference on the theory and applications of cryptographic techniques french riviera may 30 june 3 2010 proceedings
title_sub 29th Annual International Conference on the Theory and Applications of Cryptographic Techniques, French Riviera, May 30 - June 3, 2010 ; proceedings
topic Kryptosystem (DE-588)4209132-9 gnd
Kryptologie (DE-588)4033329-2 gnd
topic_facet Kryptosystem
Kryptologie
Konferenzschrift 2010 Monaco
url http://deposit.dnb.de/cgi-bin/dokserv?id=3459115&prov=M&dok_var=1&dok_ext=htm
http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020345226&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA
volume_link (DE-604)BV000000607
work_keys_str_mv AT gilberthenri advancesincryptology29thannualinternationalconferenceonthetheoryandapplicationsofcryptographictechniquesfrenchrivieramay30june32010proceedings
AT eurocryptmonaconice advancesincryptology29thannualinternationalconferenceonthetheoryandapplicationsofcryptographictechniquesfrenchrivieramay30june32010proceedings