Advances in Cryptology – EUROCRYPT '99: International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999, Proceedings: Lecture Notes in Computer Science, cartea 1592
Editat de Jacques Sternen Limba Engleză Paperback – 14 apr 1999
Din seria Lecture Notes in Computer Science
- 20% Preț: 1021.30 lei
- 20% Preț: 337.03 lei
- 20% Preț: 340.22 lei
- 20% Preț: 256.27 lei
- 20% Preț: 324.32 lei
- 20% Preț: 438.69 lei
- 20% Preț: 315.78 lei
- 20% Preț: 327.52 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 557.41 lei
- 20% Preț: 561.37 lei
- 15% Preț: 558.56 lei
- 20% Preț: 238.01 lei
- 20% Preț: 504.57 lei
- 20% Preț: 329.09 lei
- 20% Preț: 563.75 lei
- 20% Preț: 630.24 lei
- 20% Preț: 321.96 lei
- 20% Preț: 1361.10 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.39 lei
- Preț: 366.90 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.19 lei
- 20% Preț: 985.59 lei
- 20% Preț: 620.87 lei
- 20% Preț: 436.22 lei
- 20% Preț: 734.34 lei
- 20% Preț: 1034.49 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 573.92 lei
- 20% Preț: 301.95 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 327.52 lei
- 20% Preț: 794.65 lei
- 20% Preț: 569.16 lei
- Preț: 395.43 lei
- 20% Preț: 1138.26 lei
- 20% Preț: 734.34 lei
- 20% Preț: 315.78 lei
- 20% Preț: 330.70 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.98 lei
Preț: 384.86 lei
Nou
Puncte Express: 577
Preț estimativ în valută:
73.66€ • 77.70$ • 61.38£
73.66€ • 77.70$ • 61.38£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540658894
ISBN-10: 3540658890
Pagini: 500
Ilustrații: XII, 480 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.69 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540658890
Pagini: 500
Ilustrații: XII, 480 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.69 kg
Ediția:1999
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Cryptanalysis I.- Cryptanalysis of RSA with Private Key d Less than N 0.292.- Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials.- Hash Functions.- Software Performance of Universal Hash Functions.- Foundations I.- Lower Bounds for Oblivious Transfer Reductions.- On the (Im)possibility of Basing Oblivious Transfer and Bit Commitment on Weakened Security Assumptions.- Conditional Oblivious Transfer and Timed-Release Encryption.- Public Key.- An Efficient threshold Public Key Cryptosystem Secure Against Adaptive Chosen Ciphertext Attack (Extended Abstract).- Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes.- Secure Hash-and-Sign Signatures Without the Random Oracle.- Watermarking and Fingerprinting.- A Note on the Limits of Collusion-Resistant Watermarks.- Coin-Based Anonymous Fingerprinting.- Elliptic Curve.- On the Performance of Hyperelliptic Cryptosystems.- Fast Elliptic Curve Algorithm Combining Frobenius Map and Table Reference to Adapt to Higher Characteristic.- Comparing the MOV and FR Reductions in Elliptic Curve Cryptography.- New Schemes.- Unbalanced Oil and Vinegar Signature Schemes.- Public-Key Cryptosystems Based on Composite Degree Residuosity Classes.- New Public Key Cryptosystems Based on the Dependent-RSA Problems.- Block Ciphers.- Resistance Against General Iterated Attacks.- XOR and Non-XOR Differential Probabilities.- S-boxes with Controllable Nonlinearity.- Distributed Cryptography.- Secure Distributed Key Generation for Discrete-Log Based Cryptosystems.- Efficient Multiparty Computations Secure Against an Adaptive Adversary.- Distributed Pseudo-random Functions and KDCs.- Cryptanalysis II.- Improved Fast Correlation Attacks on Stream Ciphers via Convolutional Codes.- Cryptanalysis of an Identification Scheme Based on the Permuted Perceptron Problem.- Tools from Related areas.- An Analysis of Exponentiation Based on Formal Languages.- Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key (Extended Abstract).- Foundations IIz.- Computationally Private Information Retrieval with Polylogarithmic Communication.- On the Concurrent Composition of Zero-Knowledge Proofs.- Pseudorandom Function Tribe Ensembles Based on One-Way Permutations: Improvements and Applications.- Broadcast and Multicast.- Secure Communication in Broadcast Channels: The Answer to Franklin and Wright’s Question.- Efficient Communication-Storage Tradeoffs for Multicast Encryption.