000 03509nam a22004935i 4500
001 vtls000560462
003 RU-ToGU
005 20210922090359.0
007 cr nn 008mamaa
008 170212s2015 gw | s |||| 0|eng d
020 _a9783319213569
_9978-3-319-21356-9
024 7 _a10.1007/978-3-319-21356-9
_2doi
035 _ato000560462
040 _aSpringer
_cSpringer
_dRU-ToGU
050 4 _aQA76.9.A25
072 7 _aURY
_2bicssc
072 7 _aCOM053000
_2bisacsh
082 0 4 _a005.82
_223
245 1 0 _aCryptography and Information Security in the Balkans
_helectronic resource
_bFirst International Conference, BalkanCryptSec 2014, Istanbul, Turkey, October 16-17, 2014, Revised Selected Papers /
_cedited by Berna Ors, Bart Preneel.
260 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2015.
300 _aX, 251 p. 43 illus.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
490 1 _aLecture Notes in Computer Science,
_x0302-9743 ;
_v9024
505 0 _aAuthentication in Constrained Settings -- Optimizing the Placement of Tap Positions -- Families of Pseudorandom Binary Sequences with Low Cross-Correlation Measure -- Algebraic Attacks Using Binary Decision Diagrams -- Universally Composable Firewall Architectures Using Trusted Hardware -- Higher-Order Glitch Resistant Implementation of the PRESENT S-Box -- An Elliptic Curve Cryptographic Processor Using Edwards Curves and the Number Theoretic Transform -- Preventing Scaling of Successful Attacks: A Cross-Layer Security Architecture for Resource-Constrained Platforms -- A Secure and Efficient Protocol for Electronic Treasury Auctions -- Anonymous Data Collection System with Mediators -- A Multi-Party Protocol for Privacy-Preserving Cooperative Linear Systems of Equations -- Key-Policy Attribute-Based Encryption for Boolean Circuits from Bilinear Maps -- On the Anonymization of Cocks IBE Scheme -- Nearest Planes in Practice -- Timed-Release Secret Sharing Schemes with Information Theoretic Security -- A Signature Scheme for a Dynamic Coalition Defence Environment Without Trusted Third Parties.
520 _aThis book constitutes revised selected papers from the First International Conference on Cryptography and Information Security in the Balkans, Balkan Crypt Sec 2014, held in Istanbul, Turkey, in October 2014. The 15 papers presented in this volume were carefully reviewed and selected from 36 submissions. They were organized in topical sections named: symmetric cryptography, cryptographic hardware, cryptographic protocols and public key cryptography. The book also contains one invited talk in full paper length.
650 0 _aComputer Science.
_9155490
650 0 _aComputer security.
_9348012
650 0 _aData encryption (Computer science).
_9566260
650 1 4 _aComputer Science.
_9155490
650 2 4 _aData Encryption.
_9566261
650 2 4 _aSystems and Data Security.
_9303939
700 1 _aOrs, Berna.
_eeditor.
_9468303
700 1 _aPreneel, Bart.
_eeditor.
_9304669
710 2 _aSpringerLink (Online service)
_9143950
773 0 _tSpringer eBooks
830 0 _aLecture Notes in Computer Science,
_9279505
856 4 0 _uhttp://dx.doi.org/10.1007/978-3-319-21356-9
912 _aZDB-2-SCS
912 _aZDB-2-LNC
999 _c415717