Cantitate/Preț
Produs

Advances in Cryptology – EUROCRYPT '87: Workshop on the Theory and Application of Cryptographic Techniques, Amsterdam, The Netherlands, April 13-15, 1987 Proceedings: Lecture Notes in Computer Science, cartea 304

Editat de David Chaum, Wyn L. Price
en Limba Engleză Paperback – 13 apr 1988

Din seria Lecture Notes in Computer Science

Preț: 38988 lei

Nou

Puncte Express: 585

Preț estimativ în valută:
7460 7810$ 6173£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540191025
ISBN-10: 354019102X
Pagini: 328
Ilustrații: VII, 316 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.46 kg
Ediția:1988
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Sequences And Linear Complexity.- In Memoriam Tore Herlestam (1929–1986).- Alternating Step Generators Controlled by De Bruijn Sequences.- Generation of Binary Sequences with Controllable Complexity and Ideal r-Tupel Distribution.- Some Remarks on The Cross Correlation Analysis of Pseudo Random Generators.- Sequences with Almost Perfect Linear Complexity Profile.- When Shift Registers Clock Themselves.- Finite State Machine Modelling of Cryptographic Systems in Loops.- Hardware Topics.- Random Sources for Cryptographic Systems.- Physical Protection of Cryptographic Devices.- The RSA Cryptography Processor.- Public Key Topics.- Extension of Brickell’S Algorithm for Breaking High Density Knapsacks.- On Privacy Homomorphisms (Extended Abstract).- An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations.- A Public Key Analog Gyptosystem.- Authentication and Secure Transactions.- Message Authentication with Arbitration of Transmitter/Receiver Disputes.- Perfect and Essentially Perfect Authentication Schemes.- Message Authentication and Dynamic Passwords.- IC-Cards in High-Security Applications.- Hash Functions and Signatures.- Collision Free Hash Functions and Public Key Signature Schemes.- Hash-Functions Using Modulo-N Operations.- Blinding for Unanticipated Signatures.- Symmetric Ciphers: Theory.- Non-Expanding, Key-Minimal, Robustly-Perfect, Linear and Bilinear Ciphers.- Linear Structures in Blockciphers.- Fast Data Encipherment Algorithm FEAL.- Symmetric Ciphers: Application.- Modes of Blockcipher Algorithms and Their Protection Against Active Eavesdropping.- Security Considerations in the Design and Implementation of a new DES chip.- High-Performance Interface Architectures for Cryptographic Hardware.