Bits and Booleans.- Semi-bent Functions from Oval Polynomials.- Efficient Generation of Elementary Sequences.- Homomorphic Encryption.- On the Homomorphic Computation of Symmetric Cryptographic Primitives.- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.- On the Relationship between Functional Encryption, Obfuscation and Fully Homomorphic Encryption.- Codes and Applications.- On Minimal and Quasi-minimal Linear Codes.- A Code-Based Undeniable Signature Scheme.- Cryptanalysis.- Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent and the Wrong-Key Randomization Hypothesis.- Differential Cryptanalysis of Keccak Variants.- Recovering Private Keys Generated with Weak PRNGs.- Protecting against Leakage.- A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme.- High-Order Masking by Using Coding Theory and Its Application to AES.- Hash Functions.- Hashing Mode Using a Lightweight Blockcipher.- Indifferentiability of Double Length Compression Functions.- Security Amplification against Meet-in-the-Middle Attacks Using Whitening.- Key Issues.- Secure Key Management in the Cloud.- Estimating Key Sizes for High Dimensional Lattice-Based Systems.- Sub-linear Blind Ring Signatures without Random Oracles.- Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption.- Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
(nessuna copia disponibile)
Cerca: Inserisci un desiderataNon riesci a trovare il libro che stai cercando? Continueremo a cercarlo per te. Se uno dei nostri librai lo aggiunge ad AbeBooks, ti invieremo una notifica!
Inserisci un desiderata