Author: Daniel Cvrček
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 158
Book Description
Moraviacrypt '05
Author: Daniel Cvrček
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 158
Book Description
Publisher:
ISBN:
Category : Computer networks
Languages : en
Pages : 158
Book Description
Theory of Cryptography
Author: Salil P. Vadhan
Publisher: Springer Science & Business Media
ISBN: 3540709355
Category : Business & Economics
Languages : en
Pages : 606
Book Description
This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment.
Publisher: Springer Science & Business Media
ISBN: 3540709355
Category : Business & Economics
Languages : en
Pages : 606
Book Description
This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment.
Towards Hardware-Intrinsic Security
Author: Ahmad-Reza Sadeghi
Publisher: Springer Science & Business Media
ISBN: 3642144527
Category : Technology & Engineering
Languages : en
Pages : 406
Book Description
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.
Publisher: Springer Science & Business Media
ISBN: 3642144527
Category : Technology & Engineering
Languages : en
Pages : 406
Book Description
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.
Tatracrypt '07
Author: Otokar Gros̆ek
Publisher:
ISBN:
Category : Computational complexity
Languages : en
Pages : 204
Book Description
Publisher:
ISBN:
Category : Computational complexity
Languages : en
Pages : 204
Book Description
CDDEA '06
Author: Josef Diblík
Publisher:
ISBN:
Category : Difference equations
Languages : en
Pages : 298
Book Description
Publisher:
ISBN:
Category : Difference equations
Languages : en
Pages : 298
Book Description
Tatra Mountains Mathematical Publications
CDDEA '06
Author:
Publisher:
ISBN:
Category : Difference equations
Languages : en
Pages : 292
Book Description
Publisher:
ISBN:
Category : Difference equations
Languages : en
Pages : 292
Book Description
Graphs '04
Author: Igor Fabrici
Publisher:
ISBN:
Category : Combinatorial analysis
Languages : en
Pages : 192
Book Description
Publisher:
ISBN:
Category : Combinatorial analysis
Languages : en
Pages : 192
Book Description
Theory of Cryptography
Author: Yuval Ishai
Publisher: Springer Science & Business Media
ISBN: 3642195709
Category : Computers
Languages : en
Pages : 641
Book Description
This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011. The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations.
Publisher: Springer Science & Business Media
ISBN: 3642195709
Category : Computers
Languages : en
Pages : 641
Book Description
This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011. The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations.
Advances in Cryptology - CRYPTO 2007
Author: Alfred Menezes
Publisher: Springer
ISBN: 3540741437
Category : Computers
Languages : en
Pages : 643
Book Description
This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications.
Publisher: Springer
ISBN: 3540741437
Category : Computers
Languages : en
Pages : 643
Book Description
This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications.