Plus d’un million de livres, à portée de main !
Bookbot

Josef Pieprzyk

    Information Security and Privacy
    Provable Security
    Fundamentals of computer security
    Information security and privacy
    Information security
    Topics in cryptology
    • This collection covers various topics in cryptography, showcasing significant advancements and research findings. It begins with an overview of the first 30 years of cryptographic hash functions and the NIST SHA-3 competition. The exploration of public-key cryptography includes breaking RSA-based PIN encryption with minimal queries and efficient decryption methods for small encryption exponents. The text discusses resettable public-key encryption in virtual environments, hybrid encryption's plaintext-awareness, and speed records for NTRU. It also highlights high-speed parallel software implementations and refinements of algorithms over Edwards curves. Anonymity in cryptographic systems is addressed through new constructions for anonymous HIBE and identity-based adaptations of the Diffie-Hellman protocol. The work on extended sanitizable signature schemes and side-channel attacks emphasizes vulnerabilities in cryptographic protocols. Countermeasures against these attacks are proposed, including unrolling cryptographic circuits and addressing fault attacks on EMV signatures. The collection further delves into cryptanalysis, with topics like linear cryptanalysis of reduced-round PRESENT and dependent linear approximations. Practical key recovery attacks and rebound attacks on reduced hash functions are also examined. Lastly, it discusses the security of CBC MACs and the verification of hash chains, contributing to the ongoing

      Topics in cryptology
    • Information security

      • 323pages
      • 12 heures de lecture
      4,0(1)Évaluer

      The third International Workshop on Information Security was held at the U- versity of Wollongong, Australia. The conference was sponsored by the Centre for Computer Security Research, University of Wollongong. The main themes of the conference were the newly emerging issues of Information Security. Mul- media copyright protection and security aspects of e-commerce were two topics that clearly re? ect the focus of the conference. Protection of the copyright of electronic documents seems to be driven by strong practical demand from the industry for new, e cient and secure solutions. Although e-commerce is already booming, it has not reached its full potential in terms of new, e cient and secure e-commerce protocols with added properties. There were 63 papers submitted to the conference. The program committee accepted 23. Of those accepted, six papers were from Australia, ve from Japan, two each from Spain, Germany and the USA, and one each from Finland and Sweden. Four papers were co-authored by international teams from Canada and China, Korea and Australia, Taiwan and Australia, and Belgium, France and Germany, respectively. Final versions of the accepted papers were gathered using computing and other resources of the Institute of Mathematics, Polish Academy of Sciences, Warsaw, Poland. We are especially grateful to Jerzy Urbanowicz and Andrzej Pokrzywa for their help during preparation of the proceedings.

      Information security
    • Information security and privacy

      • 333pages
      • 12 heures de lecture
      3,0(1)Évaluer

      This book constitutes the thoroughly refereed post-conference proceedings of the First Australiasian Conference on Information Security and Privacy, ACISP '96, held in Wollongong, NSW, Australia, in June 1996. The volume includes revised full versions of the 26 refereed papers accepted for presentation at the conference; also included are three invited contributions. The papers are organized in topical sections on authentication, secret sharing, encryption and cryptographic functions, authentication protocols, stream ciphers, access control, security models and intrusion detection, threshold cryptography, and hashing.

      Information security and privacy
    • Fundamentals of computer security

      • 604pages
      • 22 heures de lecture
      3,7(3)Évaluer

      The book studies modern concepts of Computer Security. It is selfcontained in the sense that it introduces the basic mathematical background necessary to follow computer security concepts.

      Fundamentals of computer security
    • Provable Security

      Third International Conference, ProvSec 2009, Guangzhou, China, November 11-13, 2009. Proceedings

      • 274pages
      • 10 heures de lecture

      This book constitutes the refereed proceedings of the Third International Conference on Provable Security, ProvSec 2009, held in Guangzhou, China, November 11-13, 2009. The 19 revised full papers and two invited talks presented were carefully reviewed and selected from 64 submissions. The papers are organized in topical sections on encryption, digital signature, cryptographic protocols and reduction and privacy.

      Provable Security
    • Information Security and Privacy

      22nd Australasian Conference, ACISP 2017, Auckland, New Zealand, July 3–5, 2017, Proceedings, Part I

      • 500pages
      • 18 heures de lecture

      The two volume set LNCS 10342 and 10343 constitutes the refereed Proceedings of the 22nd Australasian Conference on Information Security and Privacy, ACISP 2017, held in Auckland, New Zealand, in July 2017. The 45 revised full papers, 2 keynotes, 8 invited papers and 10 short papers presented in this double volume, were carefully revised and selected from 150 submissions. The papers of Part I (LNCS 10342) are organized in topical sections on public key encryption; attribute-based encryption; identity-based encryption; searchable encryption; cryptanalysis; digital signatures. The papers of Part II (LNCS 10343) are organized in topical sections on symmetric cryptography; software security; network security; malware detection; privacy; authentication; elliptic curve cryptography.

      Information Security and Privacy
    • This book constitutes the refereed proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012, held in Darmstadt, Germany, in December 2012. The 22 revised full papers, presented were carefully reviewed and selected from 99 submissions. The papers are organized in topical sections on cryptanalysis; network security; cryptographic protocols; encryption; and s-box theory.

      Cryptology and network security
    • This book constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia, in December 2008. The 33 revised full papers presented together with the abstract of 1 invited lecture were carefully reviewed and selected from 208 submissions. The papers are organized in topical sections on muliti-party computation, cryptographic protocols, cryptographic hash functions, public-key cryptograhy, lattice-based cryptography, private-key cryptograhy, and analysis of stream ciphers.

      Advances in cryptology