Advances in Cryptology - CRYPTO '89: Proceedings: Lecture Notes in Computer Science, cartea 435
Editat de Gilles Brassarden Limba Engleză Paperback – 18 iun 1990
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 645.28 lei
- Preț: 410.88 lei
- 15% Preț: 580.46 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- Preț: 449.57 lei
- 20% Preț: 353.50 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 309.90 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 310.26 lei
- 20% Preț: 655.02 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 18% Preț: 938.83 lei
- 20% Preț: 591.51 lei
- 15% Preț: 438.59 lei
- 20% Preț: 337.00 lei
- Preț: 389.48 lei
- 20% Preț: 607.39 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 20% Preț: 763.23 lei
- 17% Preț: 360.19 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.57 lei
- 20% Preț: 369.12 lei
- 20% Preț: 583.40 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 764.89 lei
- 20% Preț: 583.40 lei
- 20% Preț: 649.49 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.29 lei
Preț: 431.62 lei
Nou
Puncte Express: 647
Preț estimativ în valută:
82.59€ • 86.46$ • 68.34£
82.59€ • 86.46$ • 68.34£
Carte tipărită la comandă
Livrare economică 05-19 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9780387973173
ISBN-10: 0387973176
Pagini: 634
Ilustrații: XIII, 634 p.
Dimensiuni: 170 x 242 x 33 mm
Greutate: 1.44 kg
Ediția:1990
Editura: Springer
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:New York, NY, United States
ISBN-10: 0387973176
Pagini: 634
Ilustrații: XIII, 634 p.
Dimensiuni: 170 x 242 x 33 mm
Greutate: 1.44 kg
Ediția:1990
Editura: Springer
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Opening session.- Keying the German Navy’s Enigma.- Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context.- On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs.- Why is cryptography harder than it looks?.- Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks.- The use of Encryption in Kerberos for Network Authentication.- UNIX Password Security - Ten Years Later.- Practical Problems with a Cryptographic Protection Scheme.- The Smart Diskette A Universal User Token and Personal Crypto-Engine.- Pseudo-randomness and Sequences.- On the Quadratic Spans of Periodic Sequences.- The Shortest Feedback Shift Register That Can Generate A Given Sequence.- Perfect Local Randomness in Pseudo-random Sequences.- Sparse Pseudorandom Distributions.- Bit Commitment Using Pseudo-Randomness.- Cryptanalysis and Implementation.- How to Predict Congruential Generators.- A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.- On the Linear Consistency Test (LCT) in Cryptanalysis with Applications.- Batch RSA.- On the Implementation of Elliptic Curve Cryptosystems.- Signature and Authentication I.- New Paradigms for Digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge Proofs.- Undeniable Signatures.- Signature and Authentication II.- A Certified Digital Signature.- Efficient Identification and Signatures for Smart Cards.- A signature with shared verification scheme.- On-Line/Off-Line Digital Signatures.- Threshold schemes and Key management.- On the Classification of Ideal Secret Sharing Schemes.- Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space.- Secret Sharing Over Infinite Domains.-Threshold cryptosystems.- Flexible Access Control with Master Keys.- Key distribution and Network security.- Key Distribution Protocol for Digital Mobile Communication Systems.- A key exchange system based on real quadratic fields Extended abstract.- On Key Distribution Systems.- SDNS Architecture and End-to-end Encryption.- Fast computation.- A Survey of Hardware Implementations of RSA.- Modular Exponentiation Using Recursive Sums of Residues.- A Fast Modular-multiplication Algorithm based on a Higher Radix.- Addition Chain Heuristics.- How easy is collision search. New results and applications to DES.- Odds and ends.- A Design Principle for Hash Functions.- One Way Hash Functions and DES.- Properties of Cryptosystem PGM.- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.- Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash.- Zero-knowledge and Oblivious transfer.- Efficient Identification Schemes Using Two Prover Interactive Proofs.- On the concrete complexity of zero-knowledge proofs.- Zero Knowledge Proofs of Knowledge in Two Rounds.- Minimum Resource Zero-Knowledge Proofs.- Non-Interactive Oblivious Transfer and Applications.- Multiparty computation.- Multiparty Protocols Tolerating Half Faulty Processors.- Controlled Gradual Disclosure Schemes for Random Bits and Their Applications.- Multiparty Computation with Faulty Majority.- The Spymasters Double-Agent Problem.- Impromptu talks.- On the Structure of Secret Key Exchange Protocols.- An Efficient Identification Scheme Based on Permuted Kernels (extended abstract).- An Efficient Software Protection Scheme.- Good S-Boxes Are Easy To Find.- Covert Distributed Processing with Computer Viruses.- Progress in Data Security Standardisation.- The FEAL-8 Cryptosystem and a Call for Attack.- How to Explain Zero-Knowledge Protocols to Your Children.