Advances in Cryptology – EUROCRYPT '94: Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9 - 12, 1994. Proceedings: Lecture Notes in Computer Science, cartea 950
Editat de Alfredo DeSantisen Limba Engleză Paperback – 9 aug 1995
The 36 revised full papers presented in the book are selected from 137 submissions and address all current research and advanced applicational aspects of cryptography; in addition, there are 11 short papers originating from the best special presentations accepted for the traditional rump session. The papers are organized in sections on secret sharing, hash functions, signatures, cryptosystems, pseudorandom generators, authentication codes, key agreement and key distribution, protocols, cryptanalysis and block ciphers, and number theory and algorithms.
Din seria Lecture Notes in Computer Science
- 15% Preț: 549.48 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.78 lei
- 20% Preț: 238.01 lei
- 20% Preț: 1017.66 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 256.27 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 315.19 lei
- 20% Preț: 1005.39 lei
- 20% Preț: 554.59 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 560.32 lei
- 20% Preț: 548.35 lei
- 20% Preț: 319.10 lei
- 20% Preț: 611.22 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 315.78 lei
- 20% Preț: 172.69 lei
- 20% Preț: 1339.86 lei
- Preț: 361.23 lei
- 20% Preț: 969.58 lei
- 20% Preț: 722.40 lei
- 20% Preț: 782.28 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 722.90 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.72 lei
- 20% Preț: 550.29 lei
- Preț: 389.06 lei
- 20% Preț: 564.99 lei
- 20% Preț: 552.25 lei
- 20% Preț: 552.25 lei
- 20% Preț: 552.64 lei
- 20% Preț: 331.59 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 324.65 lei
Preț vechi: 405.81 lei
-20% Nou
Puncte Express: 487
Preț estimativ în valută:
62.14€ • 66.82$ • 51.81£
62.14€ • 66.82$ • 51.81£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540601760
ISBN-10: 3540601767
Pagini: 500
Ilustrații: XIII, 477 p.
Dimensiuni: 155 x 233 x 26 mm
Greutate: 0.7 kg
Ediția:1995
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540601767
Pagini: 500
Ilustrații: XIII, 477 p.
Dimensiuni: 155 x 233 x 26 mm
Greutate: 0.7 kg
Ediția:1995
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Visual cryptography.- The size of a share must be large.- A linear construction of perfect secret sharing schemes.- On the dealer's randomness required in secret sharing schemes.- Black box cryptanalysis of hash networks based on multipermutations.- A practical attack against knapsack based hash functions.- The blinding of weak signatures.- Can D.S.A. be improved? — Complexity trade-offs with the digital signature standard —.- Designated confirmer signatures.- Optimal asymmetric encryption.- A multiple-iterated trapdoor for dense compact knapsacks.- On the security of some cryptosystems based on error-correcting codes.- Parallel divertibility of proofs of knowledge.- Methodology for digital money based on general cryptographic tools.- New group signature schemes.- Message recovery for signature schemes based on the discrete logarithm problem.- Threshold-multisignature schemes where suspected forgery implies traceability of adversarial shareholders.- The self-shrinking generator.- Feedback registers based on ramified extensions of the 2-adic numbers.- A general lower bound for the linear complexity of the product of shift-register sequences.- Embedding and probabilistic correlation attacks on clock-controlled shift registers.- Near optimal unconditionally secure authentication.- Authentication codes in plaintext and chosen-content attacks.- Linking information reconciliation and privacy amplification.- A secure and efficient conference key distribution system.- Space requirements for broadcast encryption.- How to break and repair Leighton and Micali's key agreement protocol.- Single-term divisible electronic coins.- Formal requirements for key distribution protocols.- Breaking an efficient anonymous channel.- On Matsui's linear cryptanalysis.- Links betweendifferential and linear cryptanalysis.- On correlation between the order of S-boxes and the strength of DES.- Relationships among nonlinearity criteria.- Efficient exponentiation using precomputation and vector addition chains.- MIMD-Factorisation on hypercubes.- New attacks on all double block length hash functions of hash rate 1, including the Parallel-DM.- New potentially ‘weak’ keys for DES amd LOK.- Blackmailing using undeniable signatures.- Blind signatures based on the discrete logarithm problem.- Comments on Soviet encryption algorithm.- Linear approximation of block ciphers.- Memory efficient variants of public-key schemes for smart card applications.- A systematic attack on clock controlled cascades.- On A2-codes including arbiter's attacks.- An improvement of Davies' attack on DES.- Q-deformed quantum cryptography.
Caracteristici
Includes supplementary material: sn.pub/extras