Side-channel analysis.- Virtual Security Evaluation.- Cache-Timing Attacks still threaten IoT devices.- Speed-up of SCA attacks on 32-bit multiplications. Cryptography.- Arabic Cryptography and Steganography in Morocco.- An AEAD variant of the Grain stream cipher.- Construction for a Nominative Signature Scheme from Lattice with Enhanced Security.- Reinterpreting and Improving the Cryptanalysis of the Flash Player PRNG.- A Key Exchange Based on the Short Integer Solution Problem and the Learning with Errors Problem.- Non-Interactive Zero Knowledge Proofs in the Random Oracle Model.- From Quadratic Functions to Polynomials: Generic Functional Encryption from Standard Assumptions.- Secret sharing.- Efficient Proactive Secret Sharing for Large Data via Concise Vector Commitments.- Secret Sharing using Near-MDS Codes.- Mathematics for cryptography.- On Plateaued Functions, Linear Structures and Permutation Polynomials.- Faster Scalar Multiplication on the x-line: Three-dimensional GLV Method with Three-dimensional Differential Addition Chains.- Codes and their applications.- On good polynomials over finite fields for optimal locally recoverable codes.- A New Gabidulin-like Code and its Application in Cryptography.- Perfect, Hamming and Simplex Linear Error-Block Codes with Minimum π-distance 3.- Quasi-Dyadic Girault Identification Scheme.- Homomorphic encryption.- Securely aggregating testimonies with Threshold Multi-key FHE.- Improved Efficiency of a Linearly Homomorphic Cryptosystem.- Applied cryptography.- On the Tracing Traitors Math Dedicated to the memory of Bob Blakley - pioneer of digital fingerprinting and inventor of secret sharing.- Reusable Garbled Turing Machines without FHE.- An Extension of Formal Analysis Method with Reasoning: A Case Study of Flaw Detection for Non-repudiation and Fairness.- A Practical and Insider Secure Signcryption with Non-Interactive Non-Repudiation.- Security.- Analysis of Neural Network Training and Cost Functions Impact on the Accuracy of IDS and SIEM Systems.- Managing Your Kleptographic Subscription Plan.- Model Checking Speculation-Dependent Security Properties: Abstracting and Reducing Processor Models for Sound and Complete Verification.-
Third International Conference, C2SI 2019, Rabat, Morocco, April 22-24, 2019, Proceedings - in Honor of Said el Hajji
- ISBN:
- 9783030164577
- 9783030164577
- Category:
- Computer security
- Format:
- Paperback
- Publication Date:
- 01-06-2019
- Language:
- English
- Publisher:
- Springer International Publishing AG
- Country of origin:
- Switzerland
- Dimensions (mm):
- 235x155mm
- Weight:
- 0.76kg
This title is in stock with our Australian supplier and should arrive at our Sydney warehouse within 2 - 3 weeks of you placing an order.
Once received into our warehouse we will despatch it to you with a Shipping Notification which includes online tracking.
Please check the estimated delivery times below for your region, for after your order is despatched from our warehouse:
Click on Save to My Library / Lists
Click on My Library / My Lists and I will take you there
Share This Book: