Advances in Cryptology - CRYPTO '99: 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings: Lecture Notes in Computer Science, cartea 1666
Editat de Michael Wieneren Limba Engleză Paperback – 28 iul 1999
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 567.60 lei
- 20% Preț: 571.63 lei
- 15% Preț: 568.74 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 574.05 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 20% Preț: 649.49 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 20% Preț: 575.48 lei
- 20% Preț: 747.79 lei
- 20% Preț: 1053.45 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 809.19 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 1159.14 lei
- 20% Preț: 747.79 lei
- Preț: 389.48 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 343.79 lei
Preț vechi: 429.74 lei
-20% Nou
Puncte Express: 516
Preț estimativ în valută:
65.79€ • 68.34$ • 54.65£
65.79€ • 68.34$ • 54.65£
Carte tipărită la comandă
Livrare economică 01-15 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540663478
ISBN-10: 3540663479
Pagini: 660
Ilustrații: XII, 648 p.
Dimensiuni: 155 x 235 x 35 mm
Greutate: 0.93 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540663479
Pagini: 660
Ilustrații: XII, 648 p.
Dimensiuni: 155 x 235 x 35 mm
Greutate: 0.93 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Public-Key Cryptanalysis I.- On the Security of RSA Padding.- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization.- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications.- Invited Lecture.- Information-Theoretic Cryptography.- Secure Communication and Computation.- Information Theoretically Secure Communication in the Limited Storage Space Model.- The All-or-Nothing Nature of Two-Party Secure Computation.- Distributed Cryptography.- Adaptive Security for Threshold Cryptosystems.- Two Party RSA Key Generation.- Robust Distributed Multiplication without Interaction.- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting.- Secret-Key Cryptography.- Truncated Differentials and Skipjack.- Fast Correlation Attacks Based on Turbo Code Techniques.- Highly Nonlinear Resilient Functions Optimizing Siegenthaler’s Inequality.- Message Authentication Codes.- UMAC: Fast and Secure Message Authentication.- Square Hash: Fast Message Authentication via Optimized Universal Hash Functions.- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions.- Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier.- Public-Key Cryptanalysis II.- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto ’97.- Weakness in Quaternion Signatures.- Cryptanalysis of “2R” Schemes.- Factoring N = p r q for Large r.- Traitor Tracing.- An Efficient Public Key Traitor Tracing Scheme.- Dynamic Traitor Tracing.- Efficient Methods for Integrating Traceability and Broadcast Encryption.- Differential Power Analysis.- Differential Power Analysis.- Towards Sound Approaches to Counteract Power-Analysis Attacks.- Signature Schemes.- Separability andEfficiency for Generic Group Signature Schemes.- A Forward-Secure Digital Signature Scheme.- Abuse-Free Optimistic Contract Signing.- Zero Knowledge.- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK.- On Concurrent Zero-Knowledge with Pre-processing.- Asymmetric Encryption.- On the Security Properties of OAEP as an All-or-Nothing Transform.- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization.- Secure Integration of Asymmetric and Symmetric Encryption Schemes.- Electronic Cash.- Auditable, Anonymous Electronic Cash.- Protocols and Broadcasting.- Oblivious Transfer with Adaptive Queries.- Compressing Cryptographic Resources.- Coding Constructions for Blacklisting Problems without Computational Assumptions.- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes.
Caracteristici
Includes supplementary material: sn.pub/extras