Advances in Cryptology – EUROCRYPT '85: Proceedings of a Workshop on the Theory and Application of Cryptographic Techniques. Linz, Austria, April 9-11, 1985: Lecture Notes in Computer Science, cartea 219
Editat de Franz Pichleren Limba Engleză Paperback – mai 1986
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 307.71 lei
- 20% Preț: 438.69 lei
- 20% Preț: 579.30 lei
- Preț: 410.88 lei
- 17% Preț: 427.22 lei
- 20% Preț: 596.46 lei
- 15% Preț: 448.04 lei
- 20% Preț: 353.50 lei
- Preț: 389.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 645.28 lei
- 20% Preț: 763.23 lei
- 15% Preț: 580.46 lei
- 20% Preț: 310.28 lei
- 20% Preț: 655.02 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 340.32 lei
- Preț: 449.57 lei
- 20% Preț: 591.51 lei
- 18% Preț: 938.83 lei
- 20% Preț: 337.00 lei
- 20% Preț: 649.50 lei
- 20% Preț: 607.40 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 583.40 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.49 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 585.88 lei
- 20% Preț: 825.93 lei
- 17% Preț: 360.20 lei
- 20% Preț: 763.23 lei
- 20% Preț: 340.32 lei
- 20% Preț: 504.58 lei
- 20% Preț: 369.13 lei
- 20% Preț: 580.93 lei
- 20% Preț: 343.62 lei
- 20% Preț: 350.21 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- 15% Preț: 438.59 lei
- 20% Preț: 341.95 lei
- 20% Preț: 238.01 lei
- 20% Preț: 538.30 lei
Preț: 303.93 lei
Preț vechi: 379.91 lei
-20% Nou
Puncte Express: 456
Preț estimativ în valută:
58.16€ • 60.50$ • 48.02£
58.16€ • 60.50$ • 48.02£
Carte tipărită la comandă
Livrare economică 14-28 aprilie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540164685
ISBN-10: 3540164685
Pagini: 296
Ilustrații: XII, 284 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:1986
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540164685
Pagini: 296
Ilustrații: XII, 284 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:1986
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
History of Cryptography.- The Contribution of E.B. Fleissner and A. Figl for Today’s Cryptography.- On the history of cryptography during WW2, and possible new directions for cryptographic research.- Public Key Cryptography.- Efficient Factoring Based on Partial Information.- A Public-Key Cryptosystem Based on Shift Register Sequences.- A Comment on Niederreiter’s Public Key Cryptosystem.- Implementation Study of Public Key Cryptographic Protection in an Existing Electronic Mail and Document Handling System.- Cryptanalysis of the Dickson-Scheme.- Simultaneous Security of Bits in the Discrete Log.- On Public-Key Cryptosystems Built Using Polynomial Rings.- Secret Key Cryptography.- Is the Data Encryption Standard a Group? (Preliminary Abstract).- Two New Secret Key Cryptosystems.- Cryptanalysts Representation of Nonlinearly Filtered ML-Sequences.- Authorized Writing for “Write-Once” Memories.- Shiftregister Sequences and Related Topics.- On Functions of Linear Shift Register Sequences.- On Feedforward Transforms and p-Fold Periodic p-Arrays.- Generalized Multiplexed Sequences.- A Note on Sequences Generated by Clock Controlled Shift Registers.- Using Algorithms as Keys in Stream Ciphers.- On the Linear Complexity of Combined Shift Register Sequences.- Analysis of a Nonlinear Feedforward Logic for Binary Sequence Generators.- Linear Complexity and Random Sequences.- Cryptographic Systems and Applications.- Engineering Secure Information Systems.- The Chipcard — An Identification Card with Cryptographic Protection.- Encryption Needs, Requirements and Solutions in Banking Networks.- The Role of Encipherment Services in Distributed Systems.- Modeling of Encryption Techniques for Secrecy and Privacy in Multi-User Networks.- Full Encryption in a Personal ComputerSystem.- Showing Credentials Without Identification.- Networks Without User Observability — Design Options.- The Verifiability of Two-Party Protocols.- The Practice of Authentication.- Message Protection by Spread Spectrum Modulation in a Packet Voice Radio Link.