Advances in Cryptology — CRYPTO ’93: 13th Annual International Cryptology Conference Santa Barbara, California, USA August 22–26, 1993 Proceedings: Lecture Notes in Computer Science, cartea 773
Editat de Douglas R. Stinsonen Limba Engleză Paperback – 28 feb 1994
Din seria Lecture Notes in Computer Science
- 20% Preț: 1043.63 lei
- 20% Preț: 334.61 lei
- 20% Preț: 336.22 lei
- 20% Preț: 445.69 lei
- 20% Preț: 238.01 lei
- 20% Preț: 334.61 lei
- 20% Preț: 438.69 lei
- Preț: 442.03 lei
- 20% Preț: 337.87 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 634.41 lei
- 17% Preț: 427.22 lei
- 20% Preț: 643.99 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1057.10 lei
- 20% Preț: 581.55 lei
- Preț: 374.84 lei
- 20% Preț: 331.36 lei
- 15% Preț: 431.22 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1390.89 lei
- 20% Preț: 1007.16 lei
- 20% Preț: 569.54 lei
- 20% Preț: 575.48 lei
- 20% Preț: 573.59 lei
- 20% Preț: 750.35 lei
- 15% Preț: 570.71 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 347.59 lei
- 20% Preț: 576.02 lei
- Preț: 404.00 lei
- 20% Preț: 586.43 lei
- 20% Preț: 750.35 lei
- 20% Preț: 812.01 lei
- 20% Preț: 649.49 lei
- 20% Preț: 344.34 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 393.39 lei
Nou
Puncte Express: 590
Preț estimativ în valută:
75.32€ • 78.43$ • 62.49£
75.32€ • 78.43$ • 62.49£
Carte tipărită la comandă
Livrare economică 14-28 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540577669
ISBN-10: 3540577661
Pagini: 504
Ilustrații: X, 491 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.7 kg
Ediția:1994
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540577661
Pagini: 504
Ilustrații: X, 491 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.7 kg
Ediția:1994
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Cryptosystems.- Efficient Signature Schemes Based on Birational Permutations.- A new identification scheme based on syndrome decoding.- The Shrinking Generator.- Stream Ciphers and Cryptographic Functions.- An Integrity Check Value Algorithm for Stream Ciphers.- Nonlinearly Balanced Boolean Functions and Their Propagation Characteristics.- Proof Systems and Zero-knowledge.- A Low Communication Competitive Interactive Proof System for Promised Quadratic Residuosity.- Secret Sharing and Perfect Zero Knowledge.- One Message Proof Systems with Known Space Verifiers.- Interactive Hashing can Simplify Zero-Knowledge Protocol Design Without Computational Assumptions.- Secret Sharing.- Fully Dynamic Secret Sharing Schemes.- Multisecret Threshold Schemes.- Secret Sharing Made Short.- Number Theory and Algorithms.- A Subexponential Algorithm for Discrete Logarithms over All Finite Fields.- An implementation of the general number field sieve.- On the factorization of RSA-120.- Comparison of three modular reduction functions.- Differential Cryptanalysis.- Differential Cryptanalysis of Lucifer.- Differential Attack on Message Authentication Codes.- Cryptanalysis of the CFB mode of the DES with a reduced number of rounds.- Weak Keys for IDEA.- Complexity Theory.- Entity Authentication and Key Distribution.- On the Existence of Statistically Hiding Bit Commitment Schemes and Fail-Stop Signatures.- Joint Encryption and Message-Efficient Secure Computation.- Cryptographic Primitives Based on Hard Learning Problems.- Applications.- Extensions of Single-term Coins.- Untraceable Off-line Cash in Wallet with Observers.- Discreet Solitary Games.- Authentication Codes.- On Families of Hash Functions via Geometric Codes and Concatenation.- On the Construction of Perfect Authentication Codes that Permit Arbitration.- Codes for Interactive Authentication.- Hash Functions.- Hash functions based on block ciphers: a synthetic approach.- Security of Iterated Hash Functions Based on Block Ciphers.- Cryptanalysis.- Improved Algorithms for the Permuted Kernel Problem.- On the Distribution of Characteristics in Composite Permutations.- Remark on the Threshold RSA Signature Scheme.- Another Method for Attaining Security Against Adaptively Chosen Ciphertext Attacks.- Attacks on the Birational Permutation Signature Schemes.- Key Distribution.- Interaction in Key Distribution Schemes.- Secret-Key Agreement without Public-Key Cryptography.- Broadcast Encryption.