Please use this identifier to cite or link to this item: http://localhost/handle/Hannan/1473
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Conference in Cryptology in India ; (18th : ; 2017 : ; Chennai, India) ;en_US
dc.contributor.authorPatra, Arpita. ; editor ;en_US
dc.contributor.authorSmart, Nigel P. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:29:04Z-
dc.date.available2020-05-17T08:29:04Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319716671 ;en_US
dc.identifier.isbn3319716670 ;en_US
dc.identifier.isbn9783319716664 ;en_US
dc.identifier.isbn3319716662 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1473-
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319716664 ;en_US
dc.description.abstractThis book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions ;en_US
dc.description.statementofresponsibilityedited by Arpita Patra, Nigel P. Smarten_US
dc.description.tableofcontentsPost-Quantum Cryptography using Module Lattices -- Recent Advances in Function & Homomorphic Secret Sharing -- A note on Ring-LWE security in the case of Fully Homomorphic Encryption -- Architecture level Optimizations for Kummer based HECC on FPGAs -- Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round -- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient -- Cold Boot Attacks on NTRU -- DSA Signing Key Recovery with Noisy Side Channels and Varying Error Rates -- Fast Scalar Multiplication for Elliptic Curves over Binary Fields -- Field lifting for smaller UOV public keys -- Gabidulin matrix codes and their application to small ciphertext size cryptosystems -- Lightweight Design Choices for LED-like Block Ciphers -- Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption -- Improved Differential Cryptanalysis on Generalized Feistel Schemes -- Improvements for Gate-Hiding Garbled Circuits -- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p_q -- Revisiting a Masked Lookup-Table Compression Scheme.- ;en_US
dc.format.extent1 online resource ;en_US
dc.format.extentIncludes bibliographical references and author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10698 ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10698. ; 0302-9743 ;en_US
dc.relation.haspart9783319716671.pdfen_US
dc.subjectData encryption (Computer science) ; Congresses ;en_US
dc.subjectComputer Science ;en_US
dc.subjectSecurity ;en_US
dc.subjectData Encryption ;en_US
dc.subjectAlgorithm Analysis and Problem Complexity ;en_US
dc.subjectManagement of Computing and Information Systems ;en_US
dc.subjectSystems and Data Security ;en_US
dc.subjectDiscrete Mathematics in Compen_US
dc.titleProgress in Cryptology -- INDOCRYPT 2017 :en_US
dc.title.alternative18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings /en_US
dc.title.alternativeINDOCRYPT 2017 ;en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319716671.pdf15.47 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Conference in Cryptology in India ; (18th : ; 2017 : ; Chennai, India) ;en_US
dc.contributor.authorPatra, Arpita. ; editor ;en_US
dc.contributor.authorSmart, Nigel P. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:29:04Z-
dc.date.available2020-05-17T08:29:04Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319716671 ;en_US
dc.identifier.isbn3319716670 ;en_US
dc.identifier.isbn9783319716664 ;en_US
dc.identifier.isbn3319716662 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1473-
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319716664 ;en_US
dc.description.abstractThis book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions ;en_US
dc.description.statementofresponsibilityedited by Arpita Patra, Nigel P. Smarten_US
dc.description.tableofcontentsPost-Quantum Cryptography using Module Lattices -- Recent Advances in Function & Homomorphic Secret Sharing -- A note on Ring-LWE security in the case of Fully Homomorphic Encryption -- Architecture level Optimizations for Kummer based HECC on FPGAs -- Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round -- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient -- Cold Boot Attacks on NTRU -- DSA Signing Key Recovery with Noisy Side Channels and Varying Error Rates -- Fast Scalar Multiplication for Elliptic Curves over Binary Fields -- Field lifting for smaller UOV public keys -- Gabidulin matrix codes and their application to small ciphertext size cryptosystems -- Lightweight Design Choices for LED-like Block Ciphers -- Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption -- Improved Differential Cryptanalysis on Generalized Feistel Schemes -- Improvements for Gate-Hiding Garbled Circuits -- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p_q -- Revisiting a Masked Lookup-Table Compression Scheme.- ;en_US
dc.format.extent1 online resource ;en_US
dc.format.extentIncludes bibliographical references and author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10698 ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10698. ; 0302-9743 ;en_US
dc.relation.haspart9783319716671.pdfen_US
dc.subjectData encryption (Computer science) ; Congresses ;en_US
dc.subjectComputer Science ;en_US
dc.subjectSecurity ;en_US
dc.subjectData Encryption ;en_US
dc.subjectAlgorithm Analysis and Problem Complexity ;en_US
dc.subjectManagement of Computing and Information Systems ;en_US
dc.subjectSystems and Data Security ;en_US
dc.subjectDiscrete Mathematics in Compen_US
dc.titleProgress in Cryptology -- INDOCRYPT 2017 :en_US
dc.title.alternative18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings /en_US
dc.title.alternativeINDOCRYPT 2017 ;en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319716671.pdf15.47 MBAdobe PDFThumbnail
Preview File
Full metadata record
DC FieldValueLanguage
dc.contributorInternational Conference in Cryptology in India ; (18th : ; 2017 : ; Chennai, India) ;en_US
dc.contributor.authorPatra, Arpita. ; editor ;en_US
dc.contributor.authorSmart, Nigel P. ; editor ;en_US
dc.date.accessioned2013en_US
dc.date.accessioned2020-05-17T08:29:04Z-
dc.date.available2020-05-17T08:29:04Z-
dc.date.issued2017en_US
dc.identifier.isbn9783319716671 ;en_US
dc.identifier.isbn3319716670 ;en_US
dc.identifier.isbn9783319716664 ;en_US
dc.identifier.isbn3319716662 ;en_US
dc.identifier.urihttp://localhost/handle/Hannan/1473-
dc.descriptionOhio Library and Information Network ;en_US
dc.descriptionen_US
dc.descriptionAvailable to OhioLINK libraries ;en_US
dc.descriptionQA76.9.A25 ;en_US
dc.descriptionen_US
dc.descriptionPrinted edition: ; 9783319716664 ;en_US
dc.description.abstractThis book constitutes the refereed proceedings of the 18th International Conference on Cryptology in India, INDOCRYPT 2017, held in Chennai, India, in December 2017. The 19 revised full papers presented in this book were carefully reviewed and selected from 75 submissions. The focus of the conference includes works on Public-Key Cryptography, Cryptographic Protocols, Side-Channel Attacks, Implementation of Cryptographic Schemes, Functional Encryption, Symmetric-Key Cryptanalysis, Foundations, and New Cryptographic Constructions ;en_US
dc.description.statementofresponsibilityedited by Arpita Patra, Nigel P. Smarten_US
dc.description.tableofcontentsPost-Quantum Cryptography using Module Lattices -- Recent Advances in Function & Homomorphic Secret Sharing -- A note on Ring-LWE security in the case of Fully Homomorphic Encryption -- Architecture level Optimizations for Kummer based HECC on FPGAs -- Bricklayer Attack: A Side-Channel Analysis on the ChaCha Quarter Round -- CCA-secure Predicate Encryption from Pair Encoding in Prime Order Groups: Generic and Efficient -- Cold Boot Attacks on NTRU -- DSA Signing Key Recovery with Noisy Side Channels and Varying Error Rates -- Fast Scalar Multiplication for Elliptic Curves over Binary Fields -- Field lifting for smaller UOV public keys -- Gabidulin matrix codes and their application to small ciphertext size cryptosystems -- Lightweight Design Choices for LED-like Block Ciphers -- Looting the LUTs : FPGA Optimization of AES and AES-like Ciphers for Authenticated Encryption -- Improved Differential Cryptanalysis on Generalized Feistel Schemes -- Improvements for Gate-Hiding Garbled Circuits -- Recovering Short Generators of Principal Fractional Ideals in Cyclotomic Fields of Conductor p_q -- Revisiting a Masked Lookup-Table Compression Scheme.- ;en_US
dc.format.extent1 online resource ;en_US
dc.format.extentIncludes bibliographical references and author index ;en_US
dc.publisherSpringer,en_US
dc.relation.ispartofseriesLecture Notes in Computer Science, ; 0302-9743 ; ; 10698 ;en_US
dc.relation.ispartofseriesLecture notes in computer science ; ; 10698. ; 0302-9743 ;en_US
dc.relation.haspart9783319716671.pdfen_US
dc.subjectData encryption (Computer science) ; Congresses ;en_US
dc.subjectComputer Science ;en_US
dc.subjectSecurity ;en_US
dc.subjectData Encryption ;en_US
dc.subjectAlgorithm Analysis and Problem Complexity ;en_US
dc.subjectManagement of Computing and Information Systems ;en_US
dc.subjectSystems and Data Security ;en_US
dc.subjectDiscrete Mathematics in Compen_US
dc.titleProgress in Cryptology -- INDOCRYPT 2017 :en_US
dc.title.alternative18th International Conference on Cryptology in India, Chennai, India, December 10-13, 2017, Proceedings /en_US
dc.title.alternativeINDOCRYPT 2017 ;en_US
dc.typeBooken_US
dc.publisher.placeCham :en_US
dc.classification.dc005.8/24 ; 23 ;en_US
Appears in Collections:مهندسی فناوری اطلاعات

Files in This Item:
File Description SizeFormat 
9783319716671.pdf15.47 MBAdobe PDFThumbnail
Preview File