Eintrag weiter verarbeiten

Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings

Gespeichert in:

Personen und Körperschaften: Visconti, Ivan (VerfasserIn), Prisco, Roberto (Sonstige)
Titel: Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings/ edited by Ivan Visconti, Roberto Prisco
Format: E-Book Konferenzbericht
Sprache: Englisch
veröffentlicht:
Berlin, Heidelberg Springer 2012
Gesamtaufnahme: SpringerLink
Lecture notes in computer science ; 7485
Schlagwörter:
Buchausg. u.d.T.: Security and cryptography for networks, Berlin : Springer, 2012, XI, 582 S.
Quelle: Verbunddaten SWB
Zugangsinformationen: Elektronischer Volltext - Campuslizenz
LEADER 11090cam a22020772 4500
001 0-1651698953
003 DE-627
005 20240122105033.0
007 cr uuu---uuuuu
008 120904s2012 gw |||||o 00| ||eng c
020 |a 9783642329289  |9 978-3-642-32928-9 
024 7 |a 10.1007/978-3-642-32928-9  |2 doi 
035 |a (DE-627)1651698953 
035 |a (DE-576)370654218 
035 |a (DE-599)BSZ370654218 
035 |a (OCoLC)812051716 
035 |a (ZBM)1246.68059 
035 |a (ZBM)1246.68059 
035 |a (DE-He213)978-3-642-32928-9 
035 |a (EBP)040544257 
040 |a DE-627  |b ger  |c DE-627  |e rakwb 
041 |a eng 
044 |c XA-DE  |c XA-DE-BE 
050 0 |a QA76.9.A25 
050 0 |a TK5105.59 
072 7 |a URY  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a GPJ  |2 bicssc 
084 |a SS 4800  |q SEPA  |2 rvk  |0 (DE-625)rvk/143528: 
084 |a *68-06  |2 msc 
084 |a 94-06  |2 msc 
084 |a 68P25  |2 msc 
084 |a 94A60  |2 msc 
084 |a 00B25  |2 msc 
084 |a 54.32  |2 bkl 
084 |a 54.38  |2 bkl 
100 1 |a Visconti, Ivan  |4 aut 
245 1 0 |a Security and Cryptography for Networks  |b 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings  |c edited by Ivan Visconti, Roberto Prisco 
264 1 |a Berlin, Heidelberg  |b Springer  |c 2012 
300 |a Online-Ressource (XI, 582 p. 75 illus, digital) 
336 |a Text  |b txt  |2 rdacontent 
337 |a Computermedien  |b c  |2 rdamedia 
338 |a Online-Ressource  |b cr  |2 rdacarrier 
490 1 |a Lecture Notes in Computer Science  |v 7485 
490 0 |a SpringerLink  |a Bücher 
500 |a Literaturangaben 
520 |a Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption. 
520 |a This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners. 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Information systems 
650 0 |a Information Systems 
650 0 |a Computer Science 
650 0 |a Data encryption (Computer science)  |v Congresses 
650 0 |a Computer networks  |x Access control  |v Congresses 
650 0 |a Computer science 
650 0 |a Computer Communication Networks 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Information systems 
650 0 |a Data protection 
650 0 |a Data encryption (Computer science) 
650 0 |a Computer networks  |x Security measures  |v Congresses 
650 0 |a Cryptography. 
650 0 |a Electronic data processing 
650 0 |a Information technology 
655 7 |a Konferenzschrift  |y 2012  |z Amalfi  |0 (DE-588)1071861417  |0 (DE-627)826484824  |0 (DE-576)433375485  |2 gnd-content 
689 0 0 |D s  |0 (DE-588)4070085-9  |0 (DE-627)104131403  |0 (DE-576)209179252  |a Rechnernetz  |2 gnd 
689 0 1 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 0 2 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 0 3 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 0 |5 DE-101 
689 1 0 |D s  |0 (DE-588)4070085-9  |0 (DE-627)104131403  |0 (DE-576)209179252  |a Rechnernetz  |2 gnd 
689 1 1 |D s  |0 (DE-588)4123980-5  |0 (DE-627)105751111  |0 (DE-576)209564288  |a Privatsphäre  |2 gnd 
689 1 2 |D s  |0 (DE-588)4330656-1  |0 (DE-627)133218872  |0 (DE-576)211314684  |a Authentifikation  |2 gnd 
689 1 3 |D s  |0 (DE-588)4830502-9  |0 (DE-627)489246060  |0 (DE-576)21698677X  |a Kryptoanalyse  |2 gnd 
689 1 4 |D s  |0 (DE-588)4209132-9  |0 (DE-627)105106836  |0 (DE-576)210190086  |a Kryptosystem  |2 gnd 
689 1 |5 DE-101 
689 2 0 |D s  |0 (DE-588)4070085-9  |0 (DE-627)104131403  |0 (DE-576)209179252  |a Rechnernetz  |2 gnd 
689 2 1 |D s  |0 (DE-588)4033329-2  |0 (DE-627)106257862  |0 (DE-576)209001321  |a Kryptologie  |2 gnd 
689 2 2 |D s  |0 (DE-588)4274324-2  |0 (DE-627)104467525  |0 (DE-576)21070585X  |a Computersicherheit  |2 gnd 
689 2 3 |D s  |0 (DE-588)4011144-1  |0 (DE-627)106354191  |0 (DE-576)208892001  |a Datensicherung  |2 gnd 
689 2 |5 (DE-627) 
700 1 |a Prisco, Roberto  |4 oth 
776 1 |z 9783642329272 
776 0 8 |i Buchausg. u.d.T.  |t Security and cryptography for networks  |d Berlin : Springer, 2012  |h XI, 582 S.  |w (DE-627)720966582  |w (DE-576)379842319  |z 3642329276  |z 9783642329272 
830 0 |a Lecture notes in computer science  |v 7485  |9 7485  |w (DE-627)316228877  |w (DE-576)093890923  |w (DE-600)2018930-8  |x 1611-3349  |7 ns 
856 4 0 |u https://doi.org/10.1007/978-3-642-32928-9  |m X:SPRINGER  |x Verlag  |z lizenzpflichtig  |3 Volltext 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32928-9  |x Resolving-System  |z lizenzpflichtig  |3 Volltext 
856 4 2 |u https://swbplus.bsz-bw.de/bsz370654218cov.jpg  |m V:DE-576  |m X:springer  |q image/jpeg  |v 20130405112956  |3 Cover 
856 4 2 |u https://zbmath.org/?q=an:1246.68059  |m B:ZBM  |v 2021-04-12  |x Verlag  |y Zentralblatt MATH  |3 Inhaltstext 
856 4 2 |u http://deposit.d-nb.de/cgi-bin/dokserv?id=4093453&prov=M&dok_var=1&dok_ext=htm  |m X: MVB  |q text/html  |v 2013-05-01  |x Verlag  |3 Inhaltstext 
856 4 2 |u http://d-nb.info/1024629066/04  |m B:DE-101  |q application/pdf  |v 2013-05-01  |x Verlag  |3 Inhaltsverzeichnis 
889 |w (DE-627)723771359 
912 |a ZDB-2-LNC  |b 2012 
912 |a ZDB-2-SCS  |b 2012 
912 |a ZDB-2-SEB 
912 |a ZDB-2-SXCS  |b 2012 
912 |a ZDB-2-SEB  |b 2012 
935 |h GBV  |i ExPruef 
936 r v |a SS 4800  |b Lecture notes in computer science  |k Informatik  |k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen  |k Schriftenreihen (indiv. Sign.)  |k Lecture notes in computer science  |0 (DE-627)1271461242  |0 (DE-625)rvk/143528:  |0 (DE-576)201461242 
936 b k |a 54.32  |j Rechnerkommunikation  |q SEPA  |0 (DE-627)10640623X 
936 b k |a 54.38  |j Computersicherheit  |q SEPA  |0 (DE-627)106418866 
951 |a BO 
950 |a Computernetz 
950 |a Computernetzwerk 
950 |a Datenverarbeitung 
950 |a Verbundsystem 
950 |a Mehrrechnernetz 
950 |a Vernetzung 
950 |a Datennetz 
950 |a Mehrrechnersystem 
950 |a Verteiltes System 
950 |a Cyber Security 
950 |a Datenverarbeitungssystem 
950 |a Sicherheit 
950 |a Computer 
950 |a Cybersicherheit 
950 |a Cybersecurity 
950 |a IT-Sicherheit 
950 |a Informationssicherheit 
950 |a Datensicherung 
950 |a Softwareschutz 
950 |a Kryptographisches System 
950 |a Verschlüsselungssystem 
950 |a Chiffriersystem 
950 |a Chiffrierung 
950 |a Geheimschlüssel 
950 |a Paarungsbasierte Kryptografie 
950 |a Schutz der Privatsphäre 
950 |a Persönlichkeitsrecht 
950 |a 私人领域 
950 |a 私隐 
950 |a 私人領域 
950 |a 私隱 
950 |a Сфера личной жизни 
950 |a Geheimcodetechnik 
950 |a Kryptografie 
950 |a Kryptographie 
950 |a Datenverschlüsselung 
950 |a Steganographie 
950 |a Kryptologe 
950 |a 保密学 
950 |a 密码学 
950 |a 保密學 
950 |a 密碼學 
950 |a Криптология 
950 |a Datensicherheit 
950 |a Computersicherheit 
950 |a Надёжность сохранения данных 
950 |a Authentizitätsprüfung 
950 |a Authentikation 
950 |a Authentifizierung 
950 |a Authentication 
950 |a Authentisierung 
950 |a Zugriffskontrolle 
950 |a Cryptoanalysis 
950 |a Angriff 
950 |a Attacke 
950 |a Kryptoanalytische Attacke 
950 |a Kryptoanalytischer Angriff 
950 |a Cryptanalysis 
950 |a Kryptologie 
950 |a Dechiffrierung 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32928-9  |9 DE-14 
852 |a DE-14  |x epn:3351910266  |z 2012-09-04T14:16:46Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32928-9  |9 DE-15 
852 |a DE-15  |x epn:3351910312  |z 2012-09-04T14:16:46Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32928-9  |9 DE-Ch1 
852 |a DE-Ch1  |x epn:3351910371  |z 2012-09-04T14:16:46Z 
976 |h Elektronischer Volltext - Campuslizenz 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32928-9  |z Zum Online-Dokument  |9 DE-Zi4 
852 |a DE-Zi4  |x epn:3351910428  |z 2012-09-04T14:16:46Z 
856 4 0 |u http://dx.doi.org/10.1007/978-3-642-32928-9  |9 DE-520 
852 |a DE-520  |x epn:3351910460  |z 2012-09-04T14:16:46Z 
980 |a 1651698953  |b 0  |k 1651698953  |o 370654218 
openURL url_ver=Z39.88-2004&ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fvufind.svn.sourceforge.net%3Agenerator&rft.title=Security+and+Cryptography+for+Networks%3A+8th+International+Conference%2C+SCN+2012%2C+Amalfi%2C+Italy%2C+September+5-7%2C+2012.+Proceedings&rft.date=2012&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=book&rft.btitle=Security+and+Cryptography+for+Networks%3A+8th+International+Conference%2C+SCN+2012%2C+Amalfi%2C+Italy%2C+September+5-7%2C+2012.+Proceedings&rft.series=Lecture+notes+in+computer+science%2C+7485&rft.au=Visconti%2C+Ivan&rft.pub=Springer&rft.edition=&rft.isbn=3642329284
SOLR
_version_ 1792253800858255360
access_facet Electronic Resources
author Visconti, Ivan
author2 Prisco, Roberto
author2_role oth
author2_variant r p rp
author_facet Visconti, Ivan, Prisco, Roberto
author_role aut
author_sort Visconti, Ivan
author_variant i v iv
callnumber-first Q - Science
callnumber-label QA76
callnumber-raw QA76.9.A25, TK5105.59
callnumber-search QA76.9.A25, TK5105.59
callnumber-sort QA 276.9 A25
callnumber-subject QA - Mathematics
collection ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
contents Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption., This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
ctrlnum (DE-627)1651698953, (DE-576)370654218, (DE-599)BSZ370654218, (OCoLC)812051716, (ZBM)1246.68059, (DE-He213)978-3-642-32928-9, (EBP)040544257
de15_date 2012-09-04T14:16:46Z
dech1_date 2012-09-04T14:16:46Z
doi_str_mv 10.1007/978-3-642-32928-9
era_facet 2012
facet_912a ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS
facet_avail Online
facet_local_del330 Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem
finc_class_facet Informatik, Allgemeines, Mathematik, Technik
fincclass_txtF_mv science-computerscience
footnote Literaturangaben
format eBook, ConferenceProceedings
format_access_txtF_mv Book, E-Book
format_de105 Ebook
format_de14 Book, E-Book
format_de15 Book, E-Book
format_del152 Buch
format_detail_txtF_mv text-online-monograph-independent-conference
format_dezi4 e-Book
format_finc Book, E-Book
format_legacy ElectronicBook
format_legacy_nrw Book, E-Book
format_nrw Book, E-Book
format_strict_txtF_mv E-Book
genre Konferenzschrift 2012 Amalfi (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content
genre_facet Congresses, Konferenzschrift
geogr_code not assigned
geogr_code_person not assigned
geographic_facet Amalfi
hierarchy_parent_id 0-316228877
hierarchy_parent_title Lecture notes in computer science
hierarchy_sequence 7485
hierarchy_top_id 0-316228877
hierarchy_top_title Lecture notes in computer science
id 0-1651698953
illustrated Not Illustrated
imprint Berlin, Heidelberg, Springer, 2012
imprint_str_mv Berlin, Heidelberg: Springer, 2012
institution DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15
is_hierarchy_id 0-1651698953
is_hierarchy_title Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
isbn 9783642329289
isbn_isn_mv 9783642329272, 3642329276
issn_isn_mv 1611-3349
kxp_id_str 1651698953
language English
last_indexed 2024-02-29T17:06:55.008Z
local_heading_facet_dezwi2 Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Computer networks, Data protection, Cryptography., Electronic data processing, Information technology, Access control, Security measures, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem
marc024a_ct_mv 10.1007/978-3-642-32928-9
match_str visconti2012securityandcryptographyfornetworks8thinternationalconferencescn2012amalfiitalyseptember572012proceedings
mega_collection Verbunddaten SWB
multipart_link 093890923
multipart_part (093890923)7485
oclc_num 812051716
physical Online-Ressource (XI, 582 p. 75 illus, digital)
publishDate 2012
publishDateSort 2012
publishPlace Berlin, Heidelberg
publisher Springer
record_format marcfinc
record_id 370654218
recordtype marcfinc
rsn_id_str_mv (DE-15)3160125
rvk_facet SS 4800
rvk_label Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science
rvk_path SS, SQ - SU, SS 4000 - SS 5999, SS 4800
rvk_path_str_mv SS, SQ - SU, SS 4000 - SS 5999, SS 4800
series Lecture notes in computer science, 7485
series2 Lecture Notes in Computer Science ; 7485, SpringerLink ; Bücher
source_id 0
spelling Visconti, Ivan aut, Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco, Berlin, Heidelberg Springer 2012, Online-Ressource (XI, 582 p. 75 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7485, SpringerLink Bücher, Literaturangaben, Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption., This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science) Congresses, Computer networks Access control Congresses, Data protection, Data encryption (Computer science), Computer networks Security measures Congresses, Cryptography., Electronic data processing, Information technology, Konferenzschrift 2012 Amalfi (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, DE-101, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4330656-1 (DE-627)133218872 (DE-576)211314684 Authentifikation gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, (DE-627), Prisco, Roberto oth, 9783642329272, Buchausg. u.d.T. Security and cryptography for networks Berlin : Springer, 2012 XI, 582 S. (DE-627)720966582 (DE-576)379842319 3642329276 9783642329272, Lecture notes in computer science 7485 7485 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-32928-9 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-32928-9 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz370654218cov.jpg V:DE-576 X:springer image/jpeg 20130405112956 Cover, https://zbmath.org/?q=an:1246.68059 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4093453&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, http://d-nb.info/1024629066/04 B:DE-101 application/pdf 2013-05-01 Verlag Inhaltsverzeichnis, (DE-627)723771359, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-14, DE-14 epn:3351910266 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-15, DE-15 epn:3351910312 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-Ch1, DE-Ch1 epn:3351910371 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3351910428 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-520, DE-520 epn:3351910460 2012-09-04T14:16:46Z
spellingShingle Visconti, Ivan, Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, Lecture notes in computer science, 7485, Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption., This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science) Congresses, Computer networks Access control Congresses, Data protection, Data encryption (Computer science), Computer networks Security measures Congresses, Cryptography., Electronic data processing, Information technology, Konferenzschrift 2012 Amalfi, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem
swb_id_str 370654218
title Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
title_auth Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
title_full Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco
title_fullStr Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco
title_full_unstemmed Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco
title_in_hierarchy 7485. Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings (2012)
title_short Security and Cryptography for Networks
title_sort security and cryptography for networks 8th international conference scn 2012 amalfi italy september 5 7 2012 proceedings
title_sub 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
title_unstemmed Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
topic Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science) Congresses, Computer networks Access control Congresses, Data protection, Data encryption (Computer science), Computer networks Security measures Congresses, Cryptography., Electronic data processing, Information technology, Konferenzschrift 2012 Amalfi, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem
topic_facet Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Computer networks, Data protection, Cryptography., Electronic data processing, Information technology, Access control, Security measures, Konferenzschrift, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem
url https://doi.org/10.1007/978-3-642-32928-9, http://dx.doi.org/10.1007/978-3-642-32928-9, https://swbplus.bsz-bw.de/bsz370654218cov.jpg, https://zbmath.org/?q=an:1246.68059, http://deposit.d-nb.de/cgi-bin/dokserv?id=4093453&prov=M&dok_var=1&dok_ext=htm, http://d-nb.info/1024629066/04