|
|
|
|
LEADER |
11090cam a22020772 4500 |
001 |
0-1651698953 |
003 |
DE-627 |
005 |
20240122105033.0 |
007 |
cr uuu---uuuuu |
008 |
120904s2012 gw |||||o 00| ||eng c |
020 |
|
|
|a 9783642329289
|9 978-3-642-32928-9
|
024 |
7 |
|
|a 10.1007/978-3-642-32928-9
|2 doi
|
035 |
|
|
|a (DE-627)1651698953
|
035 |
|
|
|a (DE-576)370654218
|
035 |
|
|
|a (DE-599)BSZ370654218
|
035 |
|
|
|a (OCoLC)812051716
|
035 |
|
|
|a (ZBM)1246.68059
|
035 |
|
|
|a (ZBM)1246.68059
|
035 |
|
|
|a (DE-He213)978-3-642-32928-9
|
035 |
|
|
|a (EBP)040544257
|
040 |
|
|
|a DE-627
|b ger
|c DE-627
|e rakwb
|
041 |
|
|
|a eng
|
044 |
|
|
|c XA-DE
|c XA-DE-BE
|
050 |
|
0 |
|a QA76.9.A25
|
050 |
|
0 |
|a TK5105.59
|
072 |
|
7 |
|a URY
|2 bicssc
|
072 |
|
7 |
|a COM053000
|2 bisacsh
|
072 |
|
7 |
|a GPJ
|2 bicssc
|
084 |
|
|
|a SS 4800
|q SEPA
|2 rvk
|0 (DE-625)rvk/143528:
|
084 |
|
|
|a *68-06
|2 msc
|
084 |
|
|
|a 94-06
|2 msc
|
084 |
|
|
|a 68P25
|2 msc
|
084 |
|
|
|a 94A60
|2 msc
|
084 |
|
|
|a 00B25
|2 msc
|
084 |
|
|
|a 54.32
|2 bkl
|
084 |
|
|
|a 54.38
|2 bkl
|
100 |
1 |
|
|a Visconti, Ivan
|4 aut
|
245 |
1 |
0 |
|a Security and Cryptography for Networks
|b 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings
|c edited by Ivan Visconti, Roberto Prisco
|
264 |
|
1 |
|a Berlin, Heidelberg
|b Springer
|c 2012
|
300 |
|
|
|a Online-Ressource (XI, 582 p. 75 illus, digital)
|
336 |
|
|
|a Text
|b txt
|2 rdacontent
|
337 |
|
|
|a Computermedien
|b c
|2 rdamedia
|
338 |
|
|
|a Online-Ressource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Lecture Notes in Computer Science
|v 7485
|
490 |
0 |
|
|a SpringerLink
|a Bücher
|
500 |
|
|
|a Literaturangaben
|
520 |
|
|
|a Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption.
|
520 |
|
|
|a This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners.
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Information Systems
|
650 |
|
0 |
|a Computer Science
|
650 |
|
0 |
|a Data encryption (Computer science)
|v Congresses
|
650 |
|
0 |
|a Computer networks
|x Access control
|v Congresses
|
650 |
|
0 |
|a Computer science
|
650 |
|
0 |
|a Computer Communication Networks
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Information systems
|
650 |
|
0 |
|a Data protection
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
0 |
|a Computer networks
|x Security measures
|v Congresses
|
650 |
|
0 |
|a Cryptography.
|
650 |
|
0 |
|a Electronic data processing
|
650 |
|
0 |
|a Information technology
|
655 |
|
7 |
|a Konferenzschrift
|y 2012
|z Amalfi
|0 (DE-588)1071861417
|0 (DE-627)826484824
|0 (DE-576)433375485
|2 gnd-content
|
689 |
0 |
0 |
|D s
|0 (DE-588)4070085-9
|0 (DE-627)104131403
|0 (DE-576)209179252
|a Rechnernetz
|2 gnd
|
689 |
0 |
1 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
0 |
2 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
0 |
3 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
0 |
|
|5 DE-101
|
689 |
1 |
0 |
|D s
|0 (DE-588)4070085-9
|0 (DE-627)104131403
|0 (DE-576)209179252
|a Rechnernetz
|2 gnd
|
689 |
1 |
1 |
|D s
|0 (DE-588)4123980-5
|0 (DE-627)105751111
|0 (DE-576)209564288
|a Privatsphäre
|2 gnd
|
689 |
1 |
2 |
|D s
|0 (DE-588)4330656-1
|0 (DE-627)133218872
|0 (DE-576)211314684
|a Authentifikation
|2 gnd
|
689 |
1 |
3 |
|D s
|0 (DE-588)4830502-9
|0 (DE-627)489246060
|0 (DE-576)21698677X
|a Kryptoanalyse
|2 gnd
|
689 |
1 |
4 |
|D s
|0 (DE-588)4209132-9
|0 (DE-627)105106836
|0 (DE-576)210190086
|a Kryptosystem
|2 gnd
|
689 |
1 |
|
|5 DE-101
|
689 |
2 |
0 |
|D s
|0 (DE-588)4070085-9
|0 (DE-627)104131403
|0 (DE-576)209179252
|a Rechnernetz
|2 gnd
|
689 |
2 |
1 |
|D s
|0 (DE-588)4033329-2
|0 (DE-627)106257862
|0 (DE-576)209001321
|a Kryptologie
|2 gnd
|
689 |
2 |
2 |
|D s
|0 (DE-588)4274324-2
|0 (DE-627)104467525
|0 (DE-576)21070585X
|a Computersicherheit
|2 gnd
|
689 |
2 |
3 |
|D s
|0 (DE-588)4011144-1
|0 (DE-627)106354191
|0 (DE-576)208892001
|a Datensicherung
|2 gnd
|
689 |
2 |
|
|5 (DE-627)
|
700 |
1 |
|
|a Prisco, Roberto
|4 oth
|
776 |
1 |
|
|z 9783642329272
|
776 |
0 |
8 |
|i Buchausg. u.d.T.
|t Security and cryptography for networks
|d Berlin : Springer, 2012
|h XI, 582 S.
|w (DE-627)720966582
|w (DE-576)379842319
|z 3642329276
|z 9783642329272
|
830 |
|
0 |
|a Lecture notes in computer science
|v 7485
|9 7485
|w (DE-627)316228877
|w (DE-576)093890923
|w (DE-600)2018930-8
|x 1611-3349
|7 ns
|
856 |
4 |
0 |
|u https://doi.org/10.1007/978-3-642-32928-9
|m X:SPRINGER
|x Verlag
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-32928-9
|x Resolving-System
|z lizenzpflichtig
|3 Volltext
|
856 |
4 |
2 |
|u https://swbplus.bsz-bw.de/bsz370654218cov.jpg
|m V:DE-576
|m X:springer
|q image/jpeg
|v 20130405112956
|3 Cover
|
856 |
4 |
2 |
|u https://zbmath.org/?q=an:1246.68059
|m B:ZBM
|v 2021-04-12
|x Verlag
|y Zentralblatt MATH
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://deposit.d-nb.de/cgi-bin/dokserv?id=4093453&prov=M&dok_var=1&dok_ext=htm
|m X: MVB
|q text/html
|v 2013-05-01
|x Verlag
|3 Inhaltstext
|
856 |
4 |
2 |
|u http://d-nb.info/1024629066/04
|m B:DE-101
|q application/pdf
|v 2013-05-01
|x Verlag
|3 Inhaltsverzeichnis
|
889 |
|
|
|w (DE-627)723771359
|
912 |
|
|
|a ZDB-2-LNC
|b 2012
|
912 |
|
|
|a ZDB-2-SCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|
912 |
|
|
|a ZDB-2-SXCS
|b 2012
|
912 |
|
|
|a ZDB-2-SEB
|b 2012
|
935 |
|
|
|h GBV
|i ExPruef
|
936 |
r |
v |
|a SS 4800
|b Lecture notes in computer science
|k Informatik
|k Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen
|k Schriftenreihen (indiv. Sign.)
|k Lecture notes in computer science
|0 (DE-627)1271461242
|0 (DE-625)rvk/143528:
|0 (DE-576)201461242
|
936 |
b |
k |
|a 54.32
|j Rechnerkommunikation
|q SEPA
|0 (DE-627)10640623X
|
936 |
b |
k |
|a 54.38
|j Computersicherheit
|q SEPA
|0 (DE-627)106418866
|
951 |
|
|
|a BO
|
950 |
|
|
|a Computernetz
|
950 |
|
|
|a Computernetzwerk
|
950 |
|
|
|a Datenverarbeitung
|
950 |
|
|
|a Verbundsystem
|
950 |
|
|
|a Mehrrechnernetz
|
950 |
|
|
|a Vernetzung
|
950 |
|
|
|a Datennetz
|
950 |
|
|
|a Mehrrechnersystem
|
950 |
|
|
|a Verteiltes System
|
950 |
|
|
|a Cyber Security
|
950 |
|
|
|a Datenverarbeitungssystem
|
950 |
|
|
|a Sicherheit
|
950 |
|
|
|a Computer
|
950 |
|
|
|a Cybersicherheit
|
950 |
|
|
|a Cybersecurity
|
950 |
|
|
|a IT-Sicherheit
|
950 |
|
|
|a Informationssicherheit
|
950 |
|
|
|a Datensicherung
|
950 |
|
|
|a Softwareschutz
|
950 |
|
|
|a Kryptographisches System
|
950 |
|
|
|a Verschlüsselungssystem
|
950 |
|
|
|a Chiffriersystem
|
950 |
|
|
|a Chiffrierung
|
950 |
|
|
|a Geheimschlüssel
|
950 |
|
|
|a Paarungsbasierte Kryptografie
|
950 |
|
|
|a Schutz der Privatsphäre
|
950 |
|
|
|a Persönlichkeitsrecht
|
950 |
|
|
|a 私人领域
|
950 |
|
|
|a 私隐
|
950 |
|
|
|a 私人領域
|
950 |
|
|
|a 私隱
|
950 |
|
|
|a Сфера личной жизни
|
950 |
|
|
|a Geheimcodetechnik
|
950 |
|
|
|a Kryptografie
|
950 |
|
|
|a Kryptographie
|
950 |
|
|
|a Datenverschlüsselung
|
950 |
|
|
|a Steganographie
|
950 |
|
|
|a Kryptologe
|
950 |
|
|
|a 保密学
|
950 |
|
|
|a 密码学
|
950 |
|
|
|a 保密學
|
950 |
|
|
|a 密碼學
|
950 |
|
|
|a Криптология
|
950 |
|
|
|a Datensicherheit
|
950 |
|
|
|a Computersicherheit
|
950 |
|
|
|a Надёжность сохранения данных
|
950 |
|
|
|a Authentizitätsprüfung
|
950 |
|
|
|a Authentikation
|
950 |
|
|
|a Authentifizierung
|
950 |
|
|
|a Authentication
|
950 |
|
|
|a Authentisierung
|
950 |
|
|
|a Zugriffskontrolle
|
950 |
|
|
|a Cryptoanalysis
|
950 |
|
|
|a Angriff
|
950 |
|
|
|a Attacke
|
950 |
|
|
|a Kryptoanalytische Attacke
|
950 |
|
|
|a Kryptoanalytischer Angriff
|
950 |
|
|
|a Cryptanalysis
|
950 |
|
|
|a Kryptologie
|
950 |
|
|
|a Dechiffrierung
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-32928-9
|9 DE-14
|
852 |
|
|
|a DE-14
|x epn:3351910266
|z 2012-09-04T14:16:46Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-32928-9
|9 DE-15
|
852 |
|
|
|a DE-15
|x epn:3351910312
|z 2012-09-04T14:16:46Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-32928-9
|9 DE-Ch1
|
852 |
|
|
|a DE-Ch1
|x epn:3351910371
|z 2012-09-04T14:16:46Z
|
976 |
|
|
|h Elektronischer Volltext - Campuslizenz
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-32928-9
|z Zum Online-Dokument
|9 DE-Zi4
|
852 |
|
|
|a DE-Zi4
|x epn:3351910428
|z 2012-09-04T14:16:46Z
|
856 |
4 |
0 |
|u http://dx.doi.org/10.1007/978-3-642-32928-9
|9 DE-520
|
852 |
|
|
|a DE-520
|x epn:3351910460
|z 2012-09-04T14:16:46Z
|
980 |
|
|
|a 1651698953
|b 0
|k 1651698953
|o 370654218
|
SOLR
_version_ |
1792253800858255360 |
access_facet |
Electronic Resources |
author |
Visconti, Ivan |
author2 |
Prisco, Roberto |
author2_role |
oth |
author2_variant |
r p rp |
author_facet |
Visconti, Ivan, Prisco, Roberto |
author_role |
aut |
author_sort |
Visconti, Ivan |
author_variant |
i v iv |
callnumber-first |
Q - Science |
callnumber-label |
QA76 |
callnumber-raw |
QA76.9.A25, TK5105.59 |
callnumber-search |
QA76.9.A25, TK5105.59 |
callnumber-sort |
QA 276.9 A25 |
callnumber-subject |
QA - Mathematics |
collection |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
contents |
Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption., This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners. |
ctrlnum |
(DE-627)1651698953, (DE-576)370654218, (DE-599)BSZ370654218, (OCoLC)812051716, (ZBM)1246.68059, (DE-He213)978-3-642-32928-9, (EBP)040544257 |
de15_date |
2012-09-04T14:16:46Z |
dech1_date |
2012-09-04T14:16:46Z |
doi_str_mv |
10.1007/978-3-642-32928-9 |
era_facet |
2012 |
facet_912a |
ZDB-2-LNC, ZDB-2-SCS, ZDB-2-SEB, ZDB-2-SXCS |
facet_avail |
Online |
facet_local_del330 |
Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem |
finc_class_facet |
Informatik, Allgemeines, Mathematik, Technik |
fincclass_txtF_mv |
science-computerscience |
footnote |
Literaturangaben |
format |
eBook, ConferenceProceedings |
format_access_txtF_mv |
Book, E-Book |
format_de105 |
Ebook |
format_de14 |
Book, E-Book |
format_de15 |
Book, E-Book |
format_del152 |
Buch |
format_detail_txtF_mv |
text-online-monograph-independent-conference |
format_dezi4 |
e-Book |
format_finc |
Book, E-Book |
format_legacy |
ElectronicBook |
format_legacy_nrw |
Book, E-Book |
format_nrw |
Book, E-Book |
format_strict_txtF_mv |
E-Book |
genre |
Konferenzschrift 2012 Amalfi (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content |
genre_facet |
Congresses, Konferenzschrift |
geogr_code |
not assigned |
geogr_code_person |
not assigned |
geographic_facet |
Amalfi |
hierarchy_parent_id |
0-316228877 |
hierarchy_parent_title |
Lecture notes in computer science |
hierarchy_sequence |
7485 |
hierarchy_top_id |
0-316228877 |
hierarchy_top_title |
Lecture notes in computer science |
id |
0-1651698953 |
illustrated |
Not Illustrated |
imprint |
Berlin, Heidelberg, Springer, 2012 |
imprint_str_mv |
Berlin, Heidelberg: Springer, 2012 |
institution |
DE-14, DE-Zi4, DE-Ch1, DE-520, DE-15 |
is_hierarchy_id |
0-1651698953 |
is_hierarchy_title |
Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings |
isbn |
9783642329289 |
isbn_isn_mv |
9783642329272, 3642329276 |
issn_isn_mv |
1611-3349 |
kxp_id_str |
1651698953 |
language |
English |
last_indexed |
2024-02-29T17:06:55.008Z |
local_heading_facet_dezwi2 |
Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Computer networks, Data protection, Cryptography., Electronic data processing, Information technology, Access control, Security measures, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem |
marc024a_ct_mv |
10.1007/978-3-642-32928-9 |
match_str |
visconti2012securityandcryptographyfornetworks8thinternationalconferencescn2012amalfiitalyseptember572012proceedings |
mega_collection |
Verbunddaten SWB |
multipart_link |
093890923 |
multipart_part |
(093890923)7485 |
oclc_num |
812051716 |
physical |
Online-Ressource (XI, 582 p. 75 illus, digital) |
publishDate |
2012 |
publishDateSort |
2012 |
publishPlace |
Berlin, Heidelberg |
publisher |
Springer |
record_format |
marcfinc |
record_id |
370654218 |
recordtype |
marcfinc |
rsn_id_str_mv |
(DE-15)3160125 |
rvk_facet |
SS 4800 |
rvk_label |
Informatik, Enzyklopädien und Handbücher. Kongressberichte Schriftenreihe. Tafeln und Formelsammlungen, Schriftenreihen (indiv. Sign.), Lecture notes in computer science |
rvk_path |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
rvk_path_str_mv |
SS, SQ - SU, SS 4000 - SS 5999, SS 4800 |
series |
Lecture notes in computer science, 7485 |
series2 |
Lecture Notes in Computer Science ; 7485, SpringerLink ; Bücher |
source_id |
0 |
spelling |
Visconti, Ivan aut, Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco, Berlin, Heidelberg Springer 2012, Online-Ressource (XI, 582 p. 75 illus, digital), Text txt rdacontent, Computermedien c rdamedia, Online-Ressource cr rdacarrier, Lecture Notes in Computer Science 7485, SpringerLink Bücher, Literaturangaben, Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption., This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science) Congresses, Computer networks Access control Congresses, Data protection, Data encryption (Computer science), Computer networks Security measures Congresses, Cryptography., Electronic data processing, Information technology, Konferenzschrift 2012 Amalfi (DE-588)1071861417 (DE-627)826484824 (DE-576)433375485 gnd-content, s (DE-588)4070085-9 (DE-627)104131403 (DE-576)209179252 Rechnernetz gnd, s (DE-588)4011144-1 (DE-627)106354191 (DE-576)208892001 Datensicherung gnd, s (DE-588)4274324-2 (DE-627)104467525 (DE-576)21070585X Computersicherheit gnd, s (DE-588)4033329-2 (DE-627)106257862 (DE-576)209001321 Kryptologie gnd, DE-101, s (DE-588)4123980-5 (DE-627)105751111 (DE-576)209564288 Privatsphäre gnd, s (DE-588)4330656-1 (DE-627)133218872 (DE-576)211314684 Authentifikation gnd, s (DE-588)4830502-9 (DE-627)489246060 (DE-576)21698677X Kryptoanalyse gnd, s (DE-588)4209132-9 (DE-627)105106836 (DE-576)210190086 Kryptosystem gnd, (DE-627), Prisco, Roberto oth, 9783642329272, Buchausg. u.d.T. Security and cryptography for networks Berlin : Springer, 2012 XI, 582 S. (DE-627)720966582 (DE-576)379842319 3642329276 9783642329272, Lecture notes in computer science 7485 7485 (DE-627)316228877 (DE-576)093890923 (DE-600)2018930-8 1611-3349 ns, https://doi.org/10.1007/978-3-642-32928-9 X:SPRINGER Verlag lizenzpflichtig Volltext, http://dx.doi.org/10.1007/978-3-642-32928-9 Resolving-System lizenzpflichtig Volltext, https://swbplus.bsz-bw.de/bsz370654218cov.jpg V:DE-576 X:springer image/jpeg 20130405112956 Cover, https://zbmath.org/?q=an:1246.68059 B:ZBM 2021-04-12 Verlag Zentralblatt MATH Inhaltstext, http://deposit.d-nb.de/cgi-bin/dokserv?id=4093453&prov=M&dok_var=1&dok_ext=htm X: MVB text/html 2013-05-01 Verlag Inhaltstext, http://d-nb.info/1024629066/04 B:DE-101 application/pdf 2013-05-01 Verlag Inhaltsverzeichnis, (DE-627)723771359, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-14, DE-14 epn:3351910266 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-15, DE-15 epn:3351910312 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-Ch1, DE-Ch1 epn:3351910371 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 Zum Online-Dokument DE-Zi4, DE-Zi4 epn:3351910428 2012-09-04T14:16:46Z, http://dx.doi.org/10.1007/978-3-642-32928-9 DE-520, DE-520 epn:3351910460 2012-09-04T14:16:46Z |
spellingShingle |
Visconti, Ivan, Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings, Lecture notes in computer science, 7485, Deterministic Public Key Encryption and Identity-Based Encryption from Lattices in the Auxiliary-Input Setting -- Ring Switching in BGV-Style Homomorphic Encryption -- Zero-Knowledge Proofs with Low Amortized Communication from Lattice Assumptions -- Fully Anonymous Attribute Tokens from Lattices -- Efficient Structure-Preserving Signature Scheme from Standard Assumptions -- Compact Round-Optimal Partially-Blind Signatures -- History-Free Sequential Aggregate Signatures -- A New Hash-and-Sign Approach and Structure-Preserving Signatures from DLIN -- Blackbox Construction of a More Than Non-Malleable CCA1 Encryption Scheme from Plaintext Awareness -- Decentralized Dynamic Broadcast Encryption -- Time-Specific Encryption from Forward-Secure Encryption -- Efficient Two-Party and Multi-Party Computation Improved Secure Two-Party Computation via Information-Theoretic Garbled Circuits -- 5PM: Secure Pattern Matching -- Implementing AES via an Actively/Covertly Secure Dishonest-Majority MPC Protocol -- On the Centrality of Off-Line E-Cash to Concrete Partial Information Games -- Universally Composable Security with Local Adversaries -- On the Strength Comparison of the ECDLP and the IFP -- New Attacks for Knapsack Based Cryptosystems -- Multiple Differential Cryptanalysis Using LLR and χ2 Statistics -- Quo Vadis Quaternion? Cryptanalysis of Rainbow over Non-commutative Rings -- Homomorphic Encryption for Multiplications and Pairing Evaluation -- Publicly Verifiable Ciphertexts -- Public-Key Encryption with Lazy Parties -- Probabilistically Correct Secure Arithmetic Computation for Modular Conversion, Zero Test, Comparison, MOD and Exponentiation -- MAC Aggregation with Message Multiplicity -- Efficiency Limitations of Σ-Protocols for Group Homomorphisms Revisited -- A More Efficient Computationally Sound Non-Interactive Zero-Knowledge Shuffle Argument -- Active Security in Multiparty Computation over Black-Box Groups -- Hash Combiners for Second Pre-image Resistance, Target Collision Resistance and Pre-image Resistance Have Long Output -- Human Perfectly Secure Message Transmission Protocols and Their Applications -- Oblivious Transfer with Hidden Access Control from Attribute-Based Encryption., This book constitutes the proceedings of the 8th International Conference on Security and Cryptography, SCN 2012, held in Amalfi, Italy, in September 2012. The 31 papers presented in this volume were carefully reviewed and selected from 72 submissions. They are organized in topical sections on cryptography from lattices; signature schemes; encryption schemes; efficient two-party and multi-party computation; security in the UC framework; cryptanalysis; efficient constructions; and protocols and combiners., Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science) Congresses, Computer networks Access control Congresses, Data protection, Data encryption (Computer science), Computer networks Security measures Congresses, Cryptography., Electronic data processing, Information technology, Konferenzschrift 2012 Amalfi, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem |
swb_id_str |
370654218 |
title |
Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings |
title_auth |
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings |
title_full |
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco |
title_fullStr |
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco |
title_full_unstemmed |
Security and Cryptography for Networks 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings edited by Ivan Visconti, Roberto Prisco |
title_in_hierarchy |
7485. Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings (2012) |
title_short |
Security and Cryptography for Networks |
title_sort |
security and cryptography for networks 8th international conference scn 2012 amalfi italy september 5 7 2012 proceedings |
title_sub |
8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings |
title_unstemmed |
Security and Cryptography for Networks: 8th International Conference, SCN 2012, Amalfi, Italy, September 5-7, 2012. Proceedings |
topic |
Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science) Congresses, Computer networks Access control Congresses, Data protection, Data encryption (Computer science), Computer networks Security measures Congresses, Cryptography., Electronic data processing, Information technology, Konferenzschrift 2012 Amalfi, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem |
topic_facet |
Computer science, Computer Communication Networks, Information systems, Information Systems, Computer Science, Data encryption (Computer science), Computer networks, Data protection, Cryptography., Electronic data processing, Information technology, Access control, Security measures, Konferenzschrift, Rechnernetz, Datensicherung, Computersicherheit, Kryptologie, Privatsphäre, Authentifikation, Kryptoanalyse, Kryptosystem |
url |
https://doi.org/10.1007/978-3-642-32928-9, http://dx.doi.org/10.1007/978-3-642-32928-9, https://swbplus.bsz-bw.de/bsz370654218cov.jpg, https://zbmath.org/?q=an:1246.68059, http://deposit.d-nb.de/cgi-bin/dokserv?id=4093453&prov=M&dok_var=1&dok_ext=htm, http://d-nb.info/1024629066/04 |