Advances in Cryptology: Proceedings of Crypto 82
Editat de David Chaumen Limba Engleză Paperback – 6 mar 2013
Toate formatele și edițiile | Preț | Express |
---|---|---|
Paperback (2) | 379.10 lei 6-8 săpt. | |
Springer Us – 6 mar 2013 | 379.10 lei 6-8 săpt. | |
Springer Us – 14 mar 2012 | 385.22 lei 6-8 săpt. |
Preț: 379.10 lei
Nou
Puncte Express: 569
Preț estimativ în valută:
72.55€ • 76.54$ • 60.46£
72.55€ • 76.54$ • 60.46£
Carte tipărită la comandă
Livrare economică 02-16 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9781475706048
ISBN-10: 1475706049
Pagini: 348
Ilustrații: XV, 331 p.
Dimensiuni: 170 x 244 x 18 mm
Greutate: 0.55 kg
Ediția:Softcover reprint of the original 1st ed. 1983
Editura: Springer Us
Colecția Springer
Locul publicării:New York, NY, United States
ISBN-10: 1475706049
Pagini: 348
Ilustrații: XV, 331 p.
Dimensiuni: 170 x 244 x 18 mm
Greutate: 0.55 kg
Ediția:Softcover reprint of the original 1st ed. 1983
Editura: Springer Us
Colecția Springer
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ‘Data Encryption Standard’ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breakingthe Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip.