Cantitate/Preț
Produs

Advances in Cryptology - CRYPTO 2000: 20th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2000. Proceedings: Lecture Notes in Computer Science, cartea 1880

Editat de Mihir Bellare
en Limba Engleză Paperback – 9 aug 2000

Din seria Lecture Notes in Computer Science

Preț: 33465 lei

Preț vechi: 41831 lei
-20% Nou

Puncte Express: 502

Preț estimativ în valută:
6405 6757$ 5337£

Carte tipărită la comandă

Livrare economică 02-16 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540679073
ISBN-10: 3540679073
Pagini: 564
Ilustrații: XI, 543 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.84 kg
Ediția:2000
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

XTR and NTRU.- The XTR Public Key System.- A Chosen-Ciphertext Attack against NTRU.- Privacy for Databases.- Privacy Preserving Data Mining.- Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing.- Secure Distributed Computation and Applications.- Parallel Reducibility for Information-Theoretically Secure Computation.- Optimistic Fair Secure Computation.- A Cryptographic Solution to a Game Theoretic Problem.- Algebraic Cryptosystems.- Differential Fault Attacks on Elliptic Curve Cryptosystems.- Quantum Public-Key Cryptosystems.- New Public-Key Cryptosystem Using Braid Groups.- Message Authentication.- Key Recovery and Forgery Attacks on the MacDES MAC Algorithm.- CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions.- L-collision Attacks against Randomized MACs.- Digital Signatures.- On the Exact Security of Full Domain Hash.- Timed Commitments.- A Practical and Provably Secure Coalition-Resistant Group Signature Scheme.- Provably Secure Partially Blind Signatures.- Cryptanalysis.- Weaknesses in the SL2( ) Hashing Scheme.- Fast Correlation Attacks through Reconstruction of Linear Polynomials.- Traitor Tracing and Broadcast Encryption.- Sequential Traitor Tracing.- Long-Lived Broadcast Encryption.- Invited Talk.- Taming the Adversary.- Symmetric Encryption.- The Security of All-or-Nothing Encryption: Protecting against Exhaustive Key Search.- On the Round Security of Symmetric-Key Cryptographic Primitives.- New Paradigms for Constructing Symmetric Encryption Schemes Secure against Chosen-Ciphertext Attack.- To Commit or Not to Commit.- Efficient Non-malleable Commitment Schemes.- Improved Non-committing Encryption Schemes Based on a General Complexity Assumption.- Protocols.- A Note on the Round-Complexity of Concurrent Zero-Knowledge.- An Improved Pseudo-random Generator Based on Discrete Log.- Linking Classical and Quantum Key Agreement: Is There “Bound Information”?.- Stream Ciphers and Boolean Functions.- Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers.- Nonlinearity Bounds and Constructions of Resilient Boolean Functions.- Almost Independent and Weakly Biased Arrays: Efficient Constructions and Cryptologic Applications.

Caracteristici

Includes supplementary material: sn.pub/extras