Advances in Cryptology - CRYPTO 2006: 26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4117
Editat de Cynthia Dworken Limba Engleză Paperback – 8 aug 2006
Din seria Lecture Notes in Computer Science
- 20% Preț: 741.34 lei
- 20% Preț: 340.22 lei
- 20% Preț: 343.43 lei
- 20% Preț: 315.18 lei
- 20% Preț: 327.41 lei
- 20% Preț: 1031.06 lei
- 20% Preț: 438.67 lei
- 20% Preț: 315.76 lei
- 20% Preț: 330.61 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 995.03 lei
- 20% Preț: 562.71 lei
- 20% Preț: 237.99 lei
- 20% Preț: 504.57 lei
- 20% Preț: 332.20 lei
- 15% Preț: 563.85 lei
- 20% Preț: 636.26 lei
- 5% Preț: 365.59 lei
- 20% Preț: 321.95 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.38 lei
- Preț: 370.38 lei
- 20% Preț: 172.68 lei
- 20% Preț: 315.76 lei
- 20% Preț: 662.78 lei
- 20% Preț: 256.26 lei
- 20% Preț: 440.36 lei
- 20% Preț: 626.79 lei
- 20% Preț: 566.70 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 579.38 lei
- 20% Preț: 301.94 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 330.61 lei
- 20% Preț: 1044.38 lei
- 20% Preț: 574.58 lei
- Preț: 399.17 lei
- 20% Preț: 802.24 lei
- 20% Preț: 569.11 lei
- 20% Preț: 1374.12 lei
- 20% Preț: 333.84 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.97 lei
Preț: 395.97 lei
Nou
Puncte Express: 594
Preț estimativ în valută:
75.78€ • 79.95$ • 63.15£
75.78€ • 79.95$ • 63.15£
Carte tipărită la comandă
Livrare economică 03-17 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540374329
ISBN-10: 3540374329
Pagini: 644
Ilustrații: XIV, 622 p.
Dimensiuni: 152 x 229 x 38 mm
Greutate: 0.88 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540374329
Pagini: 644
Ilustrații: XIV, 622 p.
Dimensiuni: 152 x 229 x 38 mm
Greutate: 0.88 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.- On the Power of the Randomized Iterate.- Strengthening Digital Signatures Via Randomized Hashing.- Round-Optimal Composable Blind Signatures in the Common Reference String Model.- On Signatures of Knowledge.- Non-interactive Zaps and New Techniques for NIZK.- Rankin’s Constant and Blockwise Lattice Reduction.- Lattice-Based Cryptography.- A Method for Making Password-Based Key Exchange Resilient to Server Compromise.- Mitigating Dictionary Attacks on Password-Protected Local Storage.- Rationality and Adversarial Behavior in Multi-party Computation.- When Random Sampling Preserves Privacy.- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.- On Forward-Secure Storage.- Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).- Fast Algorithms for the Free Riders Problem in Broadcast Encryption.- The Number Field Sieve in the Medium Prime Case.- Inverting HFE Is Quasipolynomial.- Cryptanalysis of 2R? Schemes.- Receipt-Free Universally-Verifiable Voting with Everlasting Privacy.- Cryptographic Protocols for Electronic Voting.- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission.- Random Selection with an Adversarial Majority.- Oblivious Transfer and Linear Functions.- On Expected Constant-Round Protocols for Byzantine Agreement.- Robust Multiparty Computation with Linear Communication Complexity.- On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.- Scalable Secure Multiparty Computation.- Algebraic Geometric Secret Sharing Schemes andSecure Multi-Party Computations over Small Fields.- Automated Security Proofs with Sequences of Games.- On Robust Combiners for Private Information Retrieval and Other Primitives.- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.- On the Higher Order Nonlinearities of Algebraic Immune Functions.- New Proofs for NMAC and HMAC: Security Without Collision-Resistance.