Advances in Cryptology — CRYPTO ’95: 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27–31, 1995. Proceedings: Lecture Notes in Computer Science, cartea 963
Editat de Don Coppersmithen Limba Engleză Paperback – 16 aug 1995
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 398.74 lei
Nou
Puncte Express: 598
Preț estimativ în valută:
76.32€ • 79.37$ • 63.96£
76.32€ • 79.37$ • 63.96£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540602217
ISBN-10: 3540602216
Pagini: 480
Ilustrații: XII, 466 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.67 kg
Ediția:1995
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540602216
Pagini: 480
Ilustrații: XII, 466 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.67 kg
Ediția:1995
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
MAC and Hash.- MDx-MAC and Building Fast MACs from Hash Functions.- XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions.- Bucket Hashing and its Application to Fast Message Authentication.- Number Theory I.- Fast Key Exchange with Elliptic Curve Systems.- Fast Server-Aided RSA Signatures Secure Against Active Attacks.- Security and Performance of Server-Aided RSA Computation Protocols.- Oblivious Transfer.- Efficient Commitment Schemes with Bounded Sender and Unbounded Receiver.- Precomputing Oblivious Transfer.- Committed Oblivious Transfer and Private Multi-Party Computation.- On the Security of the Quantum Oblivious Transfer and Key Distribution Protocols.- Cryptanalysis I.- How to Break Shamir’s Asymmetric Basis.- On the Security of the Gollmann Cascades.- Improving the Search Algorithm for the Best Linear Expression.- On Differential and Linear Cryptanalysis of the RC5 Encryption Algorithm.- Key Escrow.- A Simple Method for Generating and Sharing Pseudo-Random Functions, with Applications to Clipper-like Key Escrow Systems.- A Key Escrow System with Warrant Bounds.- Fair Cryptosystems, Revisited.- Escrow Encryption Systems Visited: Attacks, Analysis and Designs.- Protocols.- Robustness Principles for Public Key Protocols.- Cryptanalysis II.- Cryptanalysis of the Matsumoto and Imai Public Key Scheme of Eurocrypt’88.- Cryptanalysis Based on 2-Adic Rational Approximation.- A Key-schedule Weakness in SAFER K-64.- Cryptanalysis of the Immunized LL Public Key Systems.- Zero Knowledge, Interactive Protocols.- Secure Signature Schemes based on Interactive Protocols.- Improved Efficient Arguments.- Honest Verifier vs Dishonest Verifier in Public Coin Zero-Knowledge Proofs.- Secret Sharing.- Proactive Secret Sharing Or: How to Cope WithPerpetual Leakage.- Secret Sharing with Public Reconstruction.- On General Perfect Secret Sharing Schemes.- Number Theory II.- NFS with Four Large Primes: An Explosive Experiment.- Some Remarks on Lucas-Based Cryptosystems.- Secret Sharing II.- Threshold DSS Signatures without a Trusted Party.- t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes.- Everything Else.- Quantum Cryptanalysis of Hidden Linear Functions.- An Efficient Divisible Electronic Cash Scheme.- Collusion-Secure Fingerprinting for Digital Data.
Caracteristici
Includes supplementary material: sn.pub/extras