Progress in Cryptology - INDOCRYPT 2002: Third International Conference on Cryptology in India Hyderabad, India, December 16-18, 2002: Lecture Notes in Computer Science, cartea 2551
Editat de Alfred Menezes, Palash Sarkaren Limba Engleză Paperback – 2 dec 2002
Din seria Lecture Notes in Computer Science
- 20% Preț: 741.34 lei
- 20% Preț: 340.22 lei
- 20% Preț: 343.43 lei
- 20% Preț: 315.18 lei
- 20% Preț: 327.41 lei
- 20% Preț: 1031.06 lei
- 20% Preț: 438.67 lei
- 20% Preț: 315.76 lei
- 20% Preț: 330.61 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 995.03 lei
- 20% Preț: 562.71 lei
- 20% Preț: 237.99 lei
- 20% Preț: 504.57 lei
- 20% Preț: 332.20 lei
- 15% Preț: 563.85 lei
- 20% Preț: 636.26 lei
- 5% Preț: 365.59 lei
- 20% Preț: 321.95 lei
- 20% Preț: 310.26 lei
- 20% Preț: 607.38 lei
- Preț: 370.38 lei
- 20% Preț: 172.68 lei
- 20% Preț: 315.76 lei
- 20% Preț: 662.78 lei
- 20% Preț: 256.26 lei
- 20% Preț: 440.36 lei
- 20% Preț: 626.79 lei
- 20% Preț: 566.70 lei
- 17% Preț: 360.19 lei
- 20% Preț: 309.90 lei
- 20% Preț: 579.38 lei
- 20% Preț: 301.94 lei
- 20% Preț: 307.71 lei
- 20% Preț: 369.12 lei
- 20% Preț: 330.61 lei
- 20% Preț: 1044.38 lei
- 20% Preț: 574.58 lei
- Preț: 399.17 lei
- 20% Preț: 802.24 lei
- 20% Preț: 569.11 lei
- 20% Preț: 1374.12 lei
- 20% Preț: 333.84 lei
- 20% Preț: 538.29 lei
- 20% Preț: 326.97 lei
Preț: 386.81 lei
Nou
Puncte Express: 580
Preț estimativ în valută:
74.03€ • 77.16$ • 61.63£
74.03€ • 77.16$ • 61.63£
Carte tipărită la comandă
Livrare economică 06-20 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540002635
ISBN-10: 3540002634
Pagini: 456
Ilustrații: XII, 444 p.
Dimensiuni: 155 x 233 x 24 mm
Greutate: 0.65 kg
Ediția:2002
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540002634
Pagini: 456
Ilustrații: XII, 444 p.
Dimensiuni: 155 x 233 x 24 mm
Greutate: 0.65 kg
Ediția:2002
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Security of a Wide Trail Design.- Fast Algorithms for Determining the Linear Complexity of Period Sequences.- Symmetric Ciphers.- A New Class of Stream Ciphers Combining LFSR and FCSR Architectures.- Slide Attack on Spectr-H64.- On Differential Properties of Pseudo-Hadamard Transform and Related Mappings (Extended Abstract).- New Public-Key Schemes.- A Variant of NTRU with Non-invertible Polynomials.- Tree Replacement and Public Key Cryptosystem.- Foundations.- Never Trust Victor: An Alternative Resettable Zero-Knowledge Proof System.- Asynchronous Unconditionally Secure Computation: An Efficiency Improvement.- Public-Key Infrastructures.- QPKI: A QoS-Based Architecture for Public-Key Infrastructure (PKI).- Towards Logically and Physically Secure Public-Key Infrastructures.- Fingerprinting and Watermarking.- Cryptanalysis of Optimal Differential Energy Watermarking (DEW) and a Modi.ed Robust Scheme.- A 2-Secure Code with Efficient Tracing Algorithm.- Reed Solomon Codes for Digital Fingerprinting.- Public-Key Protocols.- A Note on the Malleability of the El Gamal Cryptosystem.- Authentication of Concast Communication.- Self-certified Signatures.- Identity Based Authenticated Group Key Agreement Protocol.- Boolean Functions.- Construction of Cryptographically Important Boolean Functions.- Evolving Boolean Functions Satisfying Multiple Criteria.- Further Results Related to Generalized Nonlinearity.- Efficient and Secure Implementations.- Modular Multiplication in GF(pk) Using Lagrange Representation.- Speeding up the Scalar Multiplication in the Jacobians of Hyperelliptic Curves Using Frobenius Map.- Improved Elliptic Curve Multiplication Methods Resistant against Side Channel Attacks.- Applications.- The Design and Implementation of Improved Secure CookiesBased on Certificate.- A Certified E-mail System with Receiver’s Selective Usage of Delivery Authority.- Spending Offline Divisible Coins with Combining Capability.- Efficient Object-Based Stream Authentication.- Anonymity.- The Security of a Mix-Center Based on a Semantically Secure Cryptosystem.- New Identity Escrow Scheme for Anonymity Authentication.- Secret Sharing and Oblivious Transfer.- On Unconditionally Secure Distributed Oblivious Transfer.- Non-perfect Secret Sharing over General Access Structures.- On Distributed Key Distribution Centers and Unconditionally Secure Proactive Verifiable Secret Sharing Schemes Based on General Access Structure.
Caracteristici
Includes supplementary material: sn.pub/extras