Cryptography and Information Security in the Balkans : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers (Lecture Notes in Computer Science)

個数:

Cryptography and Information Security in the Balkans : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers (Lecture Notes in Computer Science)

  • オンデマンド(OD/POD)版です。キャンセルは承れません。
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 207 p.
  • 商品コード 9783319291710

Full Description

This book contains revised selected papers from
the Second International Conference on Cryptology and Information Security in
the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015.

The 12 papers presented in
this volume were carefully reviewed and selected from 27 submissions. They are
organized in topical sections named: symmetric key cryptography; cryptanalysis;
security and protocols; and implementation and verifiable encryption.

Contents

Symmetric key cryptography.- Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes.- Results on characterizations of vectorial Bent and Plateaued Functions in arbitrary characteristic p.- Cryptographically Strong S-boxes Generated by Modified Immune Algorithm.- Cryptanalysis.- Analysis of the Authenticated Cipher MORUS.- Linear
Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes.- Time-Success Ratios under Simple Transformations: Analysis and Applications.- Security and protocols.- Synchronous Universally Composable Computer Networks.- Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps.- Closing the Gap: A Universal Privacy Framework for Outsourced Data.- Implementation and verifiable encryption.- On the Efficient Arithmetic for Lattice-Based Cryptography on GPU Using the CUDA Platform.- cuHE: A Homomorphic Encryption Accelerator Library.- Extended Functionalityin Verifiable Searchable Encryption.