Cantitate/Preț
Produs

Progress in Cryptology - AFRICACRYPT 2010: Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6055

Editat de Daniel J. Bernstein, Tanja Lange
en Limba Engleză Paperback – 14 apr 2010

Din seria Lecture Notes in Computer Science

Preț: 37835 lei

Nou

Puncte Express: 568

Preț estimativ în valută:
7246 7841$ 6040£

Carte tipărită la comandă

Livrare economică 09-23 decembrie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642126772
ISBN-10: 3642126774
Pagini: 456
Ilustrații: XIII, 437 p. 43 illus.
Greutate: 0.68 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Professional/practitioner

Cuprins

Signatures.- A New RSA-Based Signature Scheme.- Fair Blind Signatures without Random Oracles.- Fair Partially Blind Signatures.- Attacks.- Parallel Shortest Lattice Vector Enumeration on Graphics Cards.- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over .- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.- Protocols.- Proofs of Restricted Shuffles.- Batch Range Proof for Practical Small Ranges.- Optimistic Fair Priced Oblivious Transfer.- Networks.- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.- Elliptic Curves.- Avoiding Full Extension Field Arithmetic in Pairing Computations.- ECC2K-130 on Cell CPUs.- Side-Channel Attacks and Fault Attacks.- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator.- Differential Fault Analysis of HC-128.- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.- Public-Key Encryption.- Strong Cryptography from Weak Secrets.- Efficient Unidirectional Proxy Re-Encryption.- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.- Keys and PUFs.- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.- Quantum Readout of Physical Unclonable Functions.- Ciphers and Hash Functions.- Parallelizing the Camellia and SMS4 Block Ciphers.- Improved Linear Differential Attacks on CubeHash.- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.

Caracteristici

Fast track conference proceeding Unique visibility State of the art research