|
|
|
|
| LEADER |
02830nam a22004335i 4500 |
| 001 |
000288116 |
| 005 |
20210908153734.0 |
| 007 |
cr nn 008mamaa |
| 008 |
171129s2017 gw | s |||| 0|eng d |
| 020 |
|
|
|a 9783319716671
|
| 024 |
7 |
|
|a 10.1007/978-3-319-71667-1
|2 doi
|
| 040 |
|
|
|a Sistema de Bibliotecas del Tecnológico de Costa Rica
|
| 245 |
1 |
0 |
|a Progress in Cryptology - INDOCRYPT 2017 :
|b 18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings /
|c edited by Arpita Patra, Nigel P. Smart.
|
| 250 |
|
|
|a 1st ed. 2017.
|
| 260 |
# |
# |
|a Cham :
|b Springer International Publishing :
|b Imprint: Springer,
|c 2017.
|
| 300 |
|
|
|a XII, 403 p. 68 illus. :
|b online resource.
|
| 336 |
|
|
|a text
|b txt
|2 rdacontent
|
| 337 |
|
|
|a computer
|b c
|2 rdamedia
|
| 338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
| 490 |
1 |
|
|a Security and Cryptology ;
|v 10698
|
| 505 |
0 |
|
|a Post-Quantum Cryptography using Module Lattices -- Recent Advances in Function & Homomorphic Secret Sharing -- A note on Ring-LWE security in the case of Fully Homomorphic Encryption -- Architecture level Optimizations for Kummer based HECC on FPGAs -- Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round -- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient -- Cold Boot Attacks on NTRU -- DSA Signing Key Recovery with Noisy Side Channels and Varying Error Rates -- Fast Scalar Multiplication for Elliptic Curves over Binary Fields -- Field lifting for smaller UOV public keys -- Gabidulin matrix codes and their application to small ciphertext size cryptosystems -- Lightweight Design Choices for LED-like Block Ciphers -- Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption -- Improved Differential Cryptanalysis on Generalized Feistel Schemes -- Improvements for Gate-Hiding Garbled Circuits -- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p_q -- Revisiting a Masked Lookup-Table Compression Scheme.- .
|
| 650 |
|
0 |
|a Data protection.
|
| 650 |
|
0 |
|a Data encryption (Computer science).
|
| 650 |
|
0 |
|a Algorithms.
|
| 650 |
|
0 |
|a Management information systems.
|
| 650 |
|
0 |
|a Computer science.
|
| 650 |
|
0 |
|a Computer security.
|
| 650 |
|
0 |
|a Computer science-Mathematics.
|
| 650 |
1 |
4 |
|a Security.
|
| 650 |
2 |
4 |
|a Cryptology.
|
| 650 |
2 |
4 |
|a Algorithm Analysis and Problem Complexity.
|
| 650 |
2 |
4 |
|a Management of Computing and Information Systems.
|
| 650 |
2 |
4 |
|a Systems and Data Security.
|
| 650 |
2 |
4 |
|a Discrete Mathematics in Computer Science.
|
| 700 |
1 |
|
|a Patra, Arpita.
|e editor.
|
| 700 |
1 |
|
|a Smart, Nigel P.
|e editor.
|
| 710 |
2 |
|
|a SpringerLink (Online service)
|
| 773 |
0 |
|
|t Springer eBooks
|
| 900 |
|
|
|a Libro descargado a ALEPH en bloque (proveniente de proveedor)
|