My Account Log in

1 option

Cryptography and Information Security in the Balkans : Second International Conference, BalkanCryptSec 2015, Koper, Slovenia, September 3-4, 2015, Revised Selected Papers / edited by Enes Pasalic, Lars R. Knudsen.

SpringerLink Books Computer Science (2011-2024) Available online

View online
Format:
Book
Contributor:
Pasalic, Enes, Editor.
Knudsen, Lars R., Editor.
SpringerLink (Online service)
Series:
Computer Science (SpringerNature-11645)
LNCS sublibrary. Security and cryptology ; SL 4, 9540
Security and Cryptology ; 9540
Language:
English
Subjects (All):
Cryptography.
Data encryption (Computer science).
Data protection.
Cryptology.
Data and Information Security.
Local Subjects:
Cryptology.
Data and Information Security.
Physical Description:
1 online resource (VIII, 207 pages) : 19 illustrations
Edition:
1st ed. 2016.
Contained In:
Springer Nature eBook
Place of Publication:
Cham : Springer International Publishing : Imprint: Springer, 2016.
System Details:
text file PDF
Summary:
This book contains revised selected papers from the Second International Conference on Cryptology and Information Security in the Balkans, BalkanCryptSec 2015, held in Koper, Slovenia, in September 2015. The 12 papers presented in this volume were carefully reviewed and selected from 27 submissions. They are organized in topical sections named: symmetric key cryptography; cryptanalysis; security and protocols; and implementation and verifiable encryption.
Contents:
Symmetric key cryptography
Boolean Functions with Maximum Algebraic Immunity Based on Properties of Punctured Reed-Muller Codes
Results on characterizations of vectorial Bent and Plateaued Functions in arbitrary characteristic p
Cryptographically Strong S-boxes Generated by Modified Immune Algorithm
Cryptanalysis
Analysis of the Authenticated Cipher MORUS
Linear Cryptanalysis and Modified DES with Embedded Parity Check in the S-boxes
Time-Success Ratios under Simple Transformations: Analysis and Applications
Security and protocols
Synchronous Universally Composable Computer Networks
Key-policy Attribute-based Encryption for General Boolean Circuits from Secret Sharing and Multi-linear Maps
Closing the Gap: A Universal Privacy Framework for Outsourced Data
Implementation and verifiable encryption
On the Efficient Arithmetic for Lattice-Based Cryptography on GPU Using the CUDA Platform
cuHE: A Homomorphic Encryption Accelerator Library
Extended Functionality in Verifiable Searchable Encryption.
Other Format:
Printed edition:
ISBN:
978-3-319-29172-7
9783319291727
Access Restriction:
Restricted for use by site license.

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account