Moraviacrypt '05
Author : Daniel Cvrček
Publisher :
Page : 158 pages
File Size : 46,86 MB
Release : 2007
Category : Computer networks
ISBN :
Author : Daniel Cvrček
Publisher :
Page : 158 pages
File Size : 46,86 MB
Release : 2007
Category : Computer networks
ISBN :
Author : Salil P. Vadhan
Publisher : Springer Science & Business Media
Page : 606 pages
File Size : 44,43 MB
Release : 2007-02-07
Category : Business & Economics
ISBN : 3540709355
This book constitutes the refereed proceedings of the 4th Theory of Cryptography Conference, TCC 2007, held in Amsterdam, The Netherlands in February 2007. The 31 revised full papers cover encryption, universally composable security, arguments and zero knowledge, notions of security, obfuscation, secret sharing and multiparty computation, signatures and watermarking, private approximation and black-box reductions, and key establishment.
Author : Ahmad-Reza Sadeghi
Publisher : Springer Science & Business Media
Page : 406 pages
File Size : 31,97 MB
Release : 2010-11-03
Category : Technology & Engineering
ISBN : 3642144527
Hardware-intrinsic security is a young field dealing with secure secret key storage. By generating the secret keys from the intrinsic properties of the silicon, e.g., from intrinsic Physical Unclonable Functions (PUFs), no permanent secret key storage is required anymore, and the key is only present in the device for a minimal amount of time. The field is extending to hardware-based security primitives and protocols such as block ciphers and stream ciphers entangled with the hardware, thus improving IC security. While at the application level there is a growing interest in hardware security for RFID systems and the necessary accompanying system architectures. This book brings together contributions from researchers and practitioners in academia and industry, an interdisciplinary group with backgrounds in physics, mathematics, cryptography, coding theory and processor theory. It will serve as important background material for students and practitioners, and will stimulate much further research and development.
Author : Otokar Gros̆ek
Publisher :
Page : 204 pages
File Size : 26,92 MB
Release : 2008
Category : Computational complexity
ISBN :
Author : Josef Diblík
Publisher :
Page : 298 pages
File Size : 36,20 MB
Release : 2007
Category : Difference equations
ISBN :
Author :
Publisher :
Page : 228 pages
File Size : 45,41 MB
Release : 1992
Category : Mathematics
ISBN :
Author :
Publisher :
Page : 292 pages
File Size : 10,31 MB
Release : 1992
Category : Difference equations
ISBN :
Author : Igor Fabrici
Publisher :
Page : 192 pages
File Size : 28,97 MB
Release : 2007
Category : Combinatorial analysis
ISBN :
Author : Yuval Ishai
Publisher : Springer Science & Business Media
Page : 641 pages
File Size : 35,26 MB
Release : 2011-03-14
Category : Computers
ISBN : 3642195709
This book constitutes the thoroughly refereed proceedings of the 8th Theory of Cryptography Conference, TCC 2011, held in Providence, Rhode Island, USA, in March 2011. The 35 revised full papers are presented together with 2 invited talks and were carefully reviewed and selected from 108 submissions. The papers are organized in topical sections on hardness amplification, leakage resilience, tamper resilience, encryption, composable security, secure computation, privacy, coin tossing and pseudorandomness, black-box constructions and separations, and black box separations.
Author : Alfred Menezes
Publisher : Springer
Page : 643 pages
File Size : 12,36 MB
Release : 2007-08-10
Category : Computers
ISBN : 3540741437
This volume constitutes the refereed proceedings of the 27th Annual International Cryptology Conference held in Santa Barbara, California, in August 2007. Thirty-three full papers are presented along with one important invited lecture. The papers address current foundational, theoretical, and research aspects of cryptology, cryptography, and cryptanalysis. In addition, readers will discover many advanced and emerging applications.