0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (1)
  • -
Status
Brand

Showing 1 - 4 of 4 matches in All Departments

Progress in Cryptology -  INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December... Progress in Cryptology - INDOCRYPT 2009 - 10th International Conference on Cryptology in India, New Delhi, India, December 13-16, 2009, Proceedings (Paperback, 2009 ed.)
Bimal Kumar Roy, Nicolas Sendrier
R1,451 Discovery Miles 14 510 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.

The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.

Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and... Advances in Cryptology - ASIACRYPT 2005 - 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4-8, 2005, Proceedings (Paperback, 2005 ed.)
Bimal Kumar Roy
R1,522 Discovery Miles 15 220 Ships in 18 - 22 working days

Asiacrypt, the annual conference of cryptology sponsored by IACR is now 11 years old. Asiacrypt 2005 was held during December 4-8, 2005, at Hotel Taj Coromandel, Chennai, India.This conferencewasorganizedby theInternational Association for Cryptologic Research (IACR) in cooperation with the Indian Institute of Technology (IIT), Chennai. Thisyearatotalof237papersweresubmittedtoAsiacrypt2005.Thesubm- sionscoveredallareasofcryptographicresearchrepresentingthecurrentstateof work in the crypto community worldwide. Each paper was blind reviewed by at least three members of the Program Committee and papers co-authored by the PC members were reviewed by at least six members. This ?rst phase of review by the PC members was followed by a detailed discussion on the papers. At the end of the reviewing process 37 papers were accepted and were presented at the conference. The proceedings contain the revised versionsof the accepted papers. In addition we were fortunate to have Prof. Andrew Yao and Prof. Bart Preneel as invited speakers. Based on a discussion and subsequent voting among the PC members, the Best Paper Award for this year's Asiacrypt was conferred to Pascal Paillier and Damien Vergnaud for the paper entitled "Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log." I would like to thank the following people. First, the General Chair, Prof.

Fast Software Encryption - 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers (Paperback,... Fast Software Encryption - 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004, Revised Papers (Paperback, 2004 ed.)
Bimal Kumar Roy, Willi Meier
R2,850 Discovery Miles 28 500 Ships in 18 - 22 working days

2.1 Di?erential Power Analysis Di?erential Power Analysis (DPA) was introduced by Kocher, Ja?e and Jun in 1998 [13] and published in 1999 [14]. The basic idea is to make use of potential correlations between the data handled by the micro-controller and the electric consumption measured values. Since these correlations are often very low, s- tistical methods must be applied to deduce su?cient information from them. Theprinciple ofDPAattacksconsistsincomparingconsumptionvalues m- suredonthe real physical device (for instance a GSM chip or a smart card)with values computed in an hypothetical model of this device (the hypotheses being made among others on the nature of the implementation, and chie?y on a part of the secret key). By comparing these two sets of values, the attacker tries to recover all or part of the secret key. The initial target of DPA attacks was limited to symmetric algorithms. V- nerability of DES - ?rst shown by Kocher, Ja?e and Jun [13, 14]-wasfurther studied by Goubin and Patarin [11, 12], Messerges, Dabbish, Sloan [16]and Akkar, B' evan, Dischamp, Moyart [2]. Applications of these attacks were also largely taken into account during the AES selection process, notably by Biham, Shamir [4], Chari, Jutla, Rao, Rohatgi [5] and Daemen, Rijmen [8].

Progress in Cryptology - INDOCRYPT 2000 - First International Conference in Cryptology in India, Calcutta, India, December... Progress in Cryptology - INDOCRYPT 2000 - First International Conference in Cryptology in India, Calcutta, India, December 10-13, 2000. Proceedings (Paperback, 2000 ed.)
Bimal Kumar Roy, Eiji Okamoto
R1,501 Discovery Miles 15 010 Ships in 18 - 22 working days

This book constitutes the refereed proceedings of the First International Conference on Cryptology in India, INDOCRYPT 2000, held in Calcutta, India in December 2000. The 25 revised full papers presented were carefully reviewed and selected from a total of 54 submissions. The book offers topical sections on stream ciphers and Boolean functions, cryptoanalysis: stream ciphers, cryptanalysis: block ciphers, electronic cash and multiparty computation, digital signatures, elliptic curves, fast arithmetic, cryptographic protocols, and block cipher and public key cryptography.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Manufacturing Inventory and Supply…
Sanjay Sharma Hardcover R2,796 Discovery Miles 27 960
Exchange Server 2016 - Server…
Stanek Paperback R1,213 Discovery Miles 12 130
Theory And Practice Of Hydrodynamics And…
Subrata Kumar Chakrabarti Hardcover R2,276 Discovery Miles 22 760
Drag & Drop E-Mail
Davinder Singh Minhas Paperback R144 R132 Discovery Miles 1 320
River, Coastal and Estuarine…
G. Seminara, P. Blondeaux Hardcover R6,497 Discovery Miles 64 970
Dams and Dikes in Development…
H. van Duivendijk, B. Schultz, … Hardcover R2,511 R1,545 Discovery Miles 15 450
Das Postfix-Buch - Sichere Mailserver…
Peer Heinlein Paperback R1,243 Discovery Miles 12 430
Technology for Success - Computer…
Mark Ciampa, Jill West, … Paperback  (1)
R1,227 R1,145 Discovery Miles 11 450
Tools for Drought Mitigation in…
Giuseppe Rossi, Antonino Cancelliere, … Hardcover R2,461 Discovery Miles 24 610
Information Theory and Artificial…
Abebe Andualem Jemberie Paperback R2,787 Discovery Miles 27 870

 

Partners