Progress in Cryptology - INDOCRYPT 2004: 5th International Conference on Cryptology in India, Chennai, India, December 20-22, 2004, Proceedings: Lecture Notes in Computer Science, cartea 3348
Editat de Anne Canteaut, Kapaleeswaran Viswanathanen Limba Engleză Paperback – 13 dec 2004
Din seria Lecture Notes in Computer Science
- 20% Preț: 1040.03 lei
- 20% Preț: 333.46 lei
- 20% Preț: 335.08 lei
- 20% Preț: 444.17 lei
- 20% Preț: 238.01 lei
- 20% Preț: 333.46 lei
- 20% Preț: 438.69 lei
- Preț: 440.52 lei
- 20% Preț: 336.71 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 256.27 lei
- 20% Preț: 632.22 lei
- 17% Preț: 427.22 lei
- 20% Preț: 641.78 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1053.45 lei
- 20% Preț: 579.56 lei
- Preț: 373.56 lei
- 20% Preț: 330.23 lei
- 15% Preț: 429.74 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- Preț: 389.48 lei
- 20% Preț: 326.98 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 567.60 lei
- 20% Preț: 575.48 lei
- 20% Preț: 571.63 lei
- 20% Preț: 747.79 lei
- 15% Preț: 568.74 lei
- 17% Preț: 360.19 lei
- 20% Preț: 504.57 lei
- 20% Preț: 172.69 lei
- 20% Preț: 369.12 lei
- 20% Preț: 346.40 lei
- 20% Preț: 574.05 lei
- Preț: 402.62 lei
- 20% Preț: 584.40 lei
- 20% Preț: 747.79 lei
- 20% Preț: 809.19 lei
- 20% Preț: 649.49 lei
- 20% Preț: 343.16 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 389.03 lei
Nou
Puncte Express: 584
Preț estimativ în valută:
74.45€ • 77.34$ • 61.84£
74.45€ • 77.34$ • 61.84£
Carte tipărită la comandă
Livrare economică 03-17 februarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540241300
ISBN-10: 3540241302
Pagini: 452
Ilustrații: XIV, 431 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.63 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540241302
Pagini: 452
Ilustrații: XIV, 431 p.
Dimensiuni: 155 x 235 x 24 mm
Greutate: 0.63 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects.- Secure Protocols for Complex Tasks in Complex Environments.- Cryptographic Protocols.- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations.- Applications.- On the Security of a Certified E-Mail Scheme.- Multiplicative Homomorphic E-Voting.- Stream Ciphers.- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.- Algebraic Attacks over GF(q).- Cryptographic Boolean Functions.- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.- Generalized Boolean Bent Functions.- On Boolean Functions with Generalized Cryptographic Properties.- Foundations.- Information Theory and the Security of Binary Data Perturbation.- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.- Block Ciphers.- Faster Variants of the MESH Block Ciphers.- Related-Key Attacks on Reduced Rounds of SHACAL-2.- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.- Cryptanalysis of Ake98.- Public Key Encryption.- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes.- HEAD: Hybrid Encryption with Delegated Decryption Capability.- A Provably Secure Elliptic Curve Scheme with Fast Encryption.- Efficient Representations.- Advances in Alternative Non-adjacent Form Representations.- Public Key Cryptanalysis.- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Exact Analysis of Montgomery Multiplication.- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem.- Modes of Operation.- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data.- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.- The Security and Performance of the Galois/Counter Mode (GCM) of Operation.- Signatures.- Revisiting Fully Distributed Proxy Signature Schemes.- New ID-Based Threshold Signature Scheme from Bilinear Pairings.- Separable Linkable Threshold Ring Signatures.- Traitor Tracing and Visual Cryptography.- A New Black and White Visual Cryptographic Scheme for General Access Structures.- Identification Algorithms for Sequential Traitor Tracing.