Cantitate/Preț
Produs

Advances in Cryptology: Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984: Lecture Notes in Computer Science, cartea 209

Editat de Thomas Beth, Norbert Cot, Ingemar Ingemarsson
en Limba Engleză Paperback – dec 1985

Din seria Lecture Notes in Computer Science

Preț: 47343 lei

Nou

Puncte Express: 710

Preț estimativ în valută:
9063 9873$ 7603£

Carte tipărită la comandă

Livrare economică 18 decembrie 24 - 01 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540160762
ISBN-10: 3540160760
Pagini: 504
Ilustrații: X, 494 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.7 kg
Ediția:1985
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

General Theory, Classical Methods.- Cryptology and Complexity Theories.- On Cryptosystems Based on Polynomials and Finite Fields.- Algebraical Structures of Cryptographic Transformations.- Non Linear Non Commutative Functions for Data Integrity.- Wire-Tap Channel II.- Equivocations for Homophonic Ciphers.- Propagation Characteristics of the DES.- Linear Ciphers and Random Sequence Generators with Multiple Clocks.- The Stop-and-Go-Generator.- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.- On the linear complexity of cascaded sequences.- Public-Key Systems.- RSA-bits are 0.5 + ? secure.- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract).- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.- A New Trapdoor Knapsack Public Key Cryptosystem.- RSA Chips (Past/Present/Future) (Extended abstract).- Number Theoretical Papers.- The Quadratic Sieve Factoring Algorithm.- Status Report on Factoring (At the Sandia National Laboratories).- Strong Primes are Easy to Find.- Discrete logarithms in finite fields and their cryptographic significance.- Channels, Networks, Key Distribution, Protocols.- User Functions for the Generation and Distribution of Encipherment Keys.- An Optimal Class of Symmetric Key Generation Systems.- On the Use of the Binary Multiplying Channel in a Private Communication System.- Secrecy and Privacy in a Local Area Network Environment.- The Subliminal Channel and Digital Signatures.- A Provably Secure Oblivious Transfer Protocol.- On Concurrent Identification Protocols (Extended Abstract).- Applications.- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System.- Security of Transportable ComputerizedFiles.- Encryption and Key Management for the ECS Statellite Service.- An Encryption and Authentification Procedure for Telesurveillance Systems.- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques.- Smart Cards.- Session on Smart Cards Tuesday April 10.- Smart Card Applications in Security and Data Protection.- Bull CP8 Smart Card Uses in Cryptology.- Estimation of some Encryption Functions Implemented into Smart Cards.- Smart Cards and Conditional Access.