Progress in Cryptology – INDOCRYPT 2007: 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings: Lecture Notes in Computer Science, cartea 4859
Editat de K. Srinathan, C. Pandu Rangan, Moti Yungen Limba Engleză Paperback – 16 noi 2007
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 398.15 lei
Nou
Puncte Express: 597
Preț estimativ în valută:
76.21€ • 79.26$ • 63.86£
76.21€ • 79.26$ • 63.86£
Carte tipărită la comandă
Livrare economică 14-28 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540770251
ISBN-10: 3540770259
Pagini: 442
Ilustrații: XI, 428 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.65 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540770259
Pagini: 442
Ilustrații: XI, 428 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.65 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Hashing.- Linearization Attacks Against Syndrome Based Hashes.- A Meet-in-the-Middle Collision Attack Against the New FORK-256.- Multilane HMAC— Security beyond the Birthday Limit.- Elliptic Curve.- On the Bits of Elliptic Curve Diffie-Hellman Keys.- A Result on the Distribution of Quadratic Residues with Applications to Elliptic Curve Cryptography.- Cryptoanalysis.- Related-Key Attacks on the Py-Family of Ciphers and an Approach to Repair the Weaknesses.- Related-Key Differential-Linear Attacks on Reduced AES-192.- Improved Meet-in-the-Middle Attacks on Reduced-Round DES.- Information Theoretic Security.- Probabilistic Perfectly Reliable and Secure Message Transmission – Possibility, Feasibility and Optimality.- Secret Swarm Unit Reactive k??Secret Sharing.- Elliptic Curve Cryptography.- New Formulae for Efficient Elliptic Curve Arithmetic.- A Graph Theoretic Analysis of Double Base Number Systems.- Optimizing Double-Base Elliptic-Curve Single-Scalar Multiplication.- Signature.- Transitive Signatures from Braid Groups.- Proxy Re-signature Schemes Without Random Oracles.- Side Channel Attack.- First-Order Differential Power Analysis on the Duplication Method.- Solving Discrete Logarithms from Partial Knowledge of the Key.- Symmetric Cryptosystem.- New Description of SMS4 by an Embedding overGF(28).- Tweakable Enciphering Schemes from Hash-Sum-Expansion.- A Framework for Chosen IV Statistical Analysis of Stream Ciphers.- Asymmetric Cryptosystem.- Public Key Encryption with Searchable Keywords Based on Jacobi Symbols.- A Certificate-Based Proxy Cryptosystem with Revocable Proxy Decryption Power.- Short Presentation.- Computationally-Efficient Password Authenticated Key Exchange Based on Quadratic Residues.- On the k-Operation Linear Complexity of PeriodicSequences.- Trade-Off Traitor Tracing.- X-FCSR – A New Software Oriented Stream Cipher Based Upon FCSRs.- Efficient Window-Based Scalar Multiplication on Elliptic Curves Using Double-Base Number System.- Extended Multi-Property-Preserving and ECM-Construction.- Design of a Differential Power Analysis Resistant Masked AES S-Box.- LFSR Based Stream Ciphers Are Vulnerable to Power Attacks.- An Update on the Side Channel Cryptanalysis of MACs Based on Cryptographic Hash Functions.- Attacking the Filter Generator by Finding Zero Inputs of the Filtering Function.- Efficient Implementations of Some Tweakable Enciphering Schemes in Reconfigurable Hardware.