Advances in Cryptology — ASIACRYPT 2001: 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings: Lecture Notes in Computer Science, cartea 2248
Editat de Colin Boyden Limba Engleză Paperback – 28 noi 2001
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1053.45 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 15% Preț: 429.74 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 567.60 lei
- 20% Preț: 575.48 lei
- 20% Preț: 571.63 lei
- 20% Preț: 747.79 lei
- 15% Preț: 568.74 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 574.05 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 747.79 lei
- 20% Preț: 809.19 lei
- 20% Preț: 649.49 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 398.25 lei
Nou
Puncte Express: 597
Preț estimativ în valută:
76.22€ • 79.17$ • 63.31£
76.22€ • 79.17$ • 63.31£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540429876
ISBN-10: 3540429875
Pagini: 612
Ilustrații: XI, 601 p. 22 illus.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.85 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540429875
Pagini: 612
Ilustrații: XI, 601 p. 22 illus.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.85 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Lattice Based Cryptography.- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.- On the Insecurity of a Server-Aided RSA Protocol.- The Modular Inversion Hidden Number Problem.- Human Identification.- Secure Human Identification Protocols.- Invited Talk.- Unbelievable Security Matching AES Security Using Public Key Systems.- Practical Public Key Cryptography.- A Probable Prime Test with Very High Confidence for n ? 1 mod 4.- Computation of Discrete Logarithms in .- Speeding Up XTR.- An Efficient Implementation of Braid Groups.- Cryptography Based on Coding Theory.- How to Achieve a McEliece-Based Digital Signature Scheme.- Efficient Traitor Tracing Algorithms Using List Decoding.- Block Ciphers.- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.- Known-IV Attacks on Triple Modes of Operation of Block Ciphers.- Generic Attacks on Feistel Schemes.- A Compact Rijndael Hardware Architecture with S-Box Optimization.- Provable Security.- Provable Security of KASUMI and 3GPP Encryption Mode f8.- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.- Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case.- Threshold Cryptography.- Fully Distributed Threshold RSA under Standard Assumptions.- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes.- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.- Two-Party Protocols.- Oblivious Polynomial Evaluation and Oblivious Neural Learning.- Mutually Independent Commitments.- Zero Knowledge.- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank.- Responsive Round Complexity and Concurrent Zero-Knowledge.- CryptographicBuilding Blocks.- Practical Construction and Analysis of Pseudo-Randomness Primitives.- Autocorrelation Coefficients and Correlation Immunity of Boolean Functions.- Elliptic Curve Cryptography.- An Extension of Kedlaya’s Point-Counting Algorithm to Superelliptic Curves.- Supersingular Curves in Cryptography.- Short Signatures from the Weil Pairing.- Self-Blindable Credential Certificates from the Weil Pairing.- Anonymity.- How to Leak a Secret.- Key-Privacy in Public-Key Encryption.- Provably Secure air Blind Signatures with Tight Revocation.
Caracteristici
Includes supplementary material: sn.pub/extras