Advances in cryptology - ASIACRYPT 2009 : 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /

Saved in:
Bibliographic Details
Meeting name:International Conference on the Theory and Application of Cryptology and Information Security (15th : 2009 : Tokyo, Japan)
Imprint:Berlin ; New York : Springer, ©2009.
Description:1 online resource (xiv, 722 pages) : illustrations (some color).
Language:English
Series:Lecture notes in computer science, 0302-9743 ; 5912
LNCS sublibrary: SL 4 - Security and cryptology
Lecture notes in computer science ; 5912.
LNCS sublibrary. SL 4, Security and cryptology.
Subject:
Format: E-Resource Book
URL for this record:http://pi.lib.uchicago.edu/1001/cat/bib/11073547
Hidden Bibliographic Details
Varying Form of Title:ASIACRYPT 2009
Other authors / contributors:Matsui, Mitsuru, 1961-
ISBN:9783642103667
3642103669
9783642103650
3642103650
Notes:Includes bibliographical references and index.
Print version record.
Summary:This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.
Other form:Print version: International Conference on the Theory and Application of Cryptology and Information Security (15th : 2009 : Tokyo, Japan). Advances in cryptology - ASIACRYPT 2009. Berlin ; New York : Springer, ©2009 9783642103650
Publisher's no.:12796120

MARC

LEADER 00000cam a2200000Ia 4500
001 11073547
005 20170630044858.2
006 m o d
007 cr mn|||||||||
008 100209s2009 gw a ob 101 0 eng d
003 ICU
010 |a  2009938634 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d OSU  |d OCLCQ  |d OCLCF  |d BEDGE  |d OCLCO  |d NUI  |d CUS  |d COO  |d DKDLA  |d YDXCP  |d IDEBK  |d E7B  |d OCLCO  |d OCL  |d OCLCO  |d OCLCQ  |d OCLCO  |d EBLCP  |d OCLCQ  |d VT2 
015 |a 09,N45,0001  |2 dnb 
016 7 |a 997578025  |2 DE-101 
019 |a 489161187  |a 647833847  |a 964915376 
020 |a 9783642103667 
020 |a 3642103669 
020 |z 9783642103650 
020 |z 3642103650 
028 5 2 |a 12796120 
035 |a (OCoLC)505431709  |z (OCoLC)489161187  |z (OCoLC)647833847  |z (OCoLC)964915376 
050 4 |a QA76.9.A25  |b I584 2009 
072 7 |a QA  |2 lcco 
049 |a MAIN 
111 2 |a International Conference on the Theory and Application of Cryptology and Information Security  |n (15th :  |d 2009 :  |c Tokyo, Japan) 
245 1 0 |a Advances in cryptology - ASIACRYPT 2009 :  |b 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, Japan, December 6-10, 2009 : proceedings /  |c Mitsuru Matsui (ed.). 
246 3 0 |a ASIACRYPT 2009 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2009. 
300 |a 1 online resource (xiv, 722 pages) :  |b illustrations (some color). 
336 |a text  |b txt  |2 rdacontent  |0 http://id.loc.gov/vocabulary/contentTypes/txt 
337 |a computer  |b c  |2 rdamedia  |0 http://id.loc.gov/vocabulary/mediaTypes/c 
338 |a online resource  |b cr  |2 rdacarrier  |0 http://id.loc.gov/vocabulary/carriers/cr 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 5912 
490 1 |a LNCS sublibrary: SL 4 - Security and cryptology 
504 |a Includes bibliographical references and index. 
588 0 |a Print version record. 
505 0 |a Block Ciphers -- Related-Key Cryptanalysis of the Full AES-192 and AES-256 -- The Key-Dependent Attack on Block Ciphers -- Cascade Encryption Revisited -- Quantum and Post-Quantum -- Quantum-Secure Coin-Flipping and Applications -- On the Power of Two-Party Quantum Cryptography -- Security Bounds for the Design of Code-Based Cryptosystems -- Hash Functions I -- Rebound Attack on the Full Lane Compression Function -- Rebound Distinguishers: Results on the Full Whirlpool Compression Function -- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners -- The Intel AES Instructions Set and the SHA-3 Candidates -- Encryption Schemes -- Group Encryption: Non-interactive Realization in the Standard Model -- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations -- Hierarchical Predicate Encryption for Inner-Products -- Hedged Public-Key Encryption: How to Protect against Bad Randomness -- Multi Party Computation -- Secure Two-Party Computation Is Practical -- Secure Multi-party Computation Minimizing Online Rounds -- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols -- Cryptographic Protocols -- Non-malleable Statistically Hiding Commitment from Any One-Way Function -- Proofs of Storage from Homomorphic Identification Protocols -- Simple Adaptive Oblivious Transfer without Random Oracle -- Hash Functions II -- Improved Generic Algorithms for 3-Collisions -- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical -- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive! -- Models and Frameworks I -- On the Analysis of Cryptographic Assumptions in the Generic Ring Model -- Zero Knowledge in the Random Oracle Model, Revisited -- A Framework for Universally Composable Non-committing Blind Signatures -- Cryptanalysis: Sqaure and Quadratic -- Cryptanalysis of the Square Cryptosystems -- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses -- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much? -- Models and Frameworks II -- Security Notions and Generic Constructions for Client Puzzles -- Foundations of Non-malleable Hash and One-Way Functions -- Hash Functions III -- Improved Cryptanalysis of Skein -- Linearization Framework for Collision Attacks: Application to CubeHash and MD6 -- Preimages for Step-Reduced SHA-2 -- Lattice-Based -- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures -- Efficient Public Key Encryption Based on Ideal Lattices -- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices -- Side Channels -- PSS Is Secure against Random Fault Attacks -- Cache-Timing Template Attacks -- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions -- Signature Schemes with Bounded Leakage Resilience. 
520 |a This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels. 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458 
650 0 |a Computer networks  |x Access control  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007008426 
650 7 |a Informatique.  |2 eclas 
650 7 |a Computer networks  |x Access control.  |2 fast  |0 (OCoLC)fst00872298 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Hash-Algorithmus.  |2 swd 
650 7 |a Kryptoanalyse.  |2 swd 
650 7 |a Kryptologie.  |2 swd 
650 7 |a Kryptosystem.  |2 swd 
650 7 |a Sicherheitsprotokoll.  |2 swd 
655 4 |a Electronic books. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772 
700 1 |a Matsui, Mitsuru,  |d 1961-  |0 http://id.loc.gov/authorities/names/no2006113397  |1 http://viaf.org/viaf/57530374 
776 0 8 |i Print version:  |a International Conference on the Theory and Application of Cryptology and Information Security (15th : 2009 : Tokyo, Japan).  |t Advances in cryptology - ASIACRYPT 2009.  |d Berlin ; New York : Springer, ©2009  |z 9783642103650  |w (DLC) 2009938634  |w (OCoLC)471672173 
830 0 |a Lecture notes in computer science ;  |v 5912. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u http://link.springer.com/10.1007/978-3-642-10366-7  |y SpringerLink 
903 |a HeVa 
929 |a eresource 
999 f f |i 5ed9f05e-ed0b-5826-825e-88d1069b86d0  |s 2fd54120-0c06-51ff-8b7b-09785e53d206 
928 |t Library of Congress classification  |a QA76.9.A25 I584 2009  |l Online  |c UC-FullText  |u http://link.springer.com/10.1007/978-3-642-10366-7  |z SpringerLink  |g ebooks  |i 9882291