Advances in Cryptology -- CRYPTO 2003: 23rd Annual International Cryptology Conference, Santa Barbara, California, USA, August 17-21, 2003, Proceedings: Lecture Notes in Computer Science, cartea 2729
Editat de Dan Bonehen Limba Engleză Paperback – 4 aug 2003
Din seria Lecture Notes in Computer Science
- 20% Preț: 1005.39 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.19 lei
- 20% Preț: 238.01 lei
- 20% Preț: 554.98 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 1339.86 lei
- 20% Preț: 782.28 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 550.29 lei
- 20% Preț: 560.32 lei
- 20% Preț: 319.32 lei
- 15% Preț: 549.86 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 548.74 lei
- 20% Preț: 172.69 lei
- 20% Preț: 611.22 lei
- 20% Preț: 970.25 lei
- 20% Preț: 552.64 lei
- 20% Preț: 315.78 lei
- 20% Preț: 315.78 lei
- 20% Preț: 722.90 lei
- 20% Preț: 722.90 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.94 lei
- 20% Preț: 552.64 lei
- Preț: 389.31 lei
- 20% Preț: 564.99 lei
- 20% Preț: 724.49 lei
- 20% Preț: 552.64 lei
- 20% Preț: 1018.35 lei
- 20% Preț: 331.82 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 622.88 lei
Preț vechi: 732.80 lei
-15% Nou
Puncte Express: 934
Preț estimativ în valută:
119.28€ • 129.01$ • 99.39£
119.28€ • 129.01$ • 99.39£
Carte tipărită la comandă
Livrare economică 11-25 decembrie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540406747
ISBN-10: 3540406743
Pagini: 648
Ilustrații: XII, 636 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.89 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540406743
Pagini: 648
Ilustrații: XII, 636 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.89 kg
Ediția:2003
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Public Key Cryptanalysis I.- Factoring Large Numbers with the TWIRL Device.- New Partial Key Exposure Attacks on RSA.- Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.- Alternate Adversary Models.- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model.- Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret.- Invited Talk I.- On Cryptographic Assumptions and Challenges.- Protocols.- Scalable Protocols for Authenticated Group Key Exchange.- Practical Verifiable Encryption and Decryption of Discrete Logarithms.- Extending Oblivious Transfers Efficiently.- Symmetric Key Cryptanalysis I.- Algebraic Attacks on Combiners with Memory.- Fast Algebraic Attacks on Stream Ciphers with Linear Feedback.- Cryptanalysis of Safer++.- Public Key Cryptanalysis II.- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem.- The Impact of Decryption Failures on the Security of NTRU Encryption.- Universal Composability.- Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption.- Universal Composition with Joint State.- Zero-Knowledge.- Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More.- Derandomization in Cryptography.- On Deniability in the Common Reference String and Random Oracle Model.- Algebraic Geometry.- Primality Proving via One Round in ECPP and One Iteration in AKS.- Torus-Based Cryptography.- Public Key Constructions.- Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation.- Multipurpose Identity-Based Signcryption.- Invited Talk II.- SIGMA: The ‘SIGn-and-MAc’ Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols.- New Problems.- OnMemory-Bound Functions for Fighting Spam.- Lower and Upper Bounds on Obtaining History Independence.- Private Circuits: Securing Hardware against Probing Attacks.- Symmetric Key Constructions.- A Tweakable Enciphering Mode.- A Message Authentication Code Based on Unimodular Matrix Groups.- Luby-Rackoff: 7 Rounds Are Enough for 2 n(1????) Security.- New Models.- Weak Key Authenticity and the Computational Completeness of Formal Encryption.- Plaintext Awareness via Key Registration.- Relaxing Chosen-Ciphertext Security.- Symmetric Key Cryptanalysis II.- Password Interception in a SSL/TLS Channel.- Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.- Making a Faster Cryptanalytic Time-Memory Trade-Off.