Research in cryptology : 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers / Frederik Armknecht, Stefan Lucks (eds.)

This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: Western European Workshop on Research in Cryptology Weimar, Thuringia, Germany
Other Authors: Armknecht, Frederik, Lucks, Stefan
Other title:WEWoRC 2011.
Format: Conference Proceeding eBook
Language:English
Published: Berlin ; New York : Springer, ©2012.
Series:Lecture notes in computer science ; 7242.
LNCS sublibrary. Security and cryptology.
Subjects:

MARC

LEADER 00000cam a2200000Ka 4500
001 b7238485
006 m o d
007 cr |||||||||||
008 121024s2012 gw ob 101 0 eng d
005 20240418144434.5
010 |a 2012948763 
019 |a 964878663 
020 |a 9783642341595  |q (electronic bk.) 
020 |a 3642341594  |q (electronic bk.) 
020 |z 9783642341588 
020 |a 3642341586 
020 |a 9783642341588 
035 |a (OCoLC)spr814275050 
035 |a (OCoLC)814275050  |z (OCoLC)964878663 
037 |a spr10.1007/978-3-642-34159-5 
040 |a GW5XE  |b eng  |e pn  |c GW5XE  |d NTE  |d ZMC  |d YDXCP  |d COO  |d NUI  |d E7B  |d OCLCF  |d BEDGE  |d OCLCO  |d OCLCA  |d OCL  |d OCLCO  |d OCLCQ  |d EBLCP  |d VT2 
049 |a GWRE 
050 4 |a QA76.9.A25  |b W47 2011 
111 2 |a Western European Workshop on Research in Cryptology  |n (4th :  |d 2011 :  |c Weimar, Thuringia, Germany) 
245 1 0 |a Research in cryptology :  |b 4th Western European Workshop, WEWoRC 2011, Weimar, Germany, July 20-22, 2011, Revised selected papers /  |c Frederik Armknecht, Stefan Lucks (eds.) 
246 3 |a WEWoRC 2011. 
260 |a Berlin ;  |a New York :  |b Springer,  |c ©2012. 
300 |a 1 online resource. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
490 1 |a Lecture notes in computer science,  |x 0302-9743 ;  |v 7242. 
490 1 |a LNCS sublibrary. SL 4, Security and cryptology. 
505 0 0 |t Broadcast Attacks against Code-Based Schemes /  |r Robert Niebuhr and Pierre-Louis Cayrel --  |t On the Security of Hummingbird-2 against Side Channel Cube Attacks /  |r Xinxin Fan and Guang Gong --  |t Full Lattice Basis Reduction on Graphics Cards /  |r Timo Bartkewitz and Tim Güneysu --  |t Breaking DVB-CSA /  |r Erik Tews, Julian Wälde and Michael Weiner --  |t On the Role of Expander Graphs in Key Predistribution Schemes for Wireless Sensor Networks /  |r Michelle Kendall and Keith M. Martin --  |t [Camma]-MAC[H2P] -- A  |t New Universal MAC Scheme /  |r Ewan Fleischmann, Christian Forler and Stefan Lucks --  |t New Universal Hash Functions /  |r Aysajan Abidin and Jan-Åke Larsson --  |t Cryptanalysis of TWIS Block Cipher /  |r Onur Koçak and Neşe Öztop --  |t RSA Vulnerabilities with Small Prime Difference /  |r Marián Kühnel --  |t Combining Multiplication Methods with Optimized Processing Sequence for Polynomial Multiplier in GF(2k) /  |r Zoya Dyka, Peter Langendoerfer and Frank Vater. 
504 |a Includes bibliographical references and author index. 
520 |a This book constitutes the refereed proceedings of the 4th Western European Workshop on Research in Cryptology, WEWoRC 2011, held in Weimar Germany, in July 2011. The 10 revised full papers were carefully reviewed and selected from numerour submissions. The papers span a wide spectrum of topics from foundations of cryptology, upto secret-key cryptosystems and hash functions, public-key cryptosystems, modes of operation, cryptographic protocols, hardware and software implementation of cryptosystems and their integration into secure systems, and applications such as watermarking and code obfuscation. 
650 0 |a Data encryption (Computer science)  |v Congresses. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Armknecht, Frederik. 
700 1 |a Lucks, Stefan. 
830 0 |a Lecture notes in computer science ;  |v 7242. 
830 0 |a LNCS sublibrary.  |n SL 4,  |p Security and cryptology. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=http://link.springer.com/10.1007/978-3-642-34159-5  |z Full Text (via Springer) 
907 |a .b72384852  |b 02-06-21  |c 11-26-12 
998 |a web  |b 05-01-17  |c f  |d b   |e -  |f eng  |g gw   |h 0  |i 1 
907 |a .b72384852  |b 05-09-17  |c 11-26-12 
915 |a K 
956 |a Springer e-books 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
956 |b Springer Nature - Springer Computer Science eBooks 2012 English International 
999 f f |i bf5964a9-3e0d-5f42-9af4-6bf8919fd77a  |s dcb5f354-e5c1-5fb9-bcc5-431e0d8a51c8 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 W47 2011  |h Library of Congress classification  |i Ebooks, Prospector  |n 1