Cantitate/Preț
Produs

Progress in Cryptology - INDOCRYPT 2010: 11th International Conference on Cryptology in India, Hyderabad, India, December 12-15, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6498

Editat de Guang Gong, Kishan Chand Gupta
en Limba Engleză Paperback – 16 noi 2010

Din seria Lecture Notes in Computer Science

Preț: 39451 lei

Nou

Puncte Express: 592

Preț estimativ în valută:
7550 7834$ 6310£

Carte disponibilă

Livrare economică 22 februarie-08 martie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642174001
ISBN-10: 3642174000
Pagini: 366
Ilustrații: XVI, 366 p. 63 illus.
Greutate: 0.57 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Invited Talk.- Getting a Few Things Right and Many Things Wrong.- Security of RSA and Multivariate Schemes.- Partial Key Exposure Attack on RSA – Improvements for Limited Lattice Dimensions.- Towards Provable Security of the Unbalanced Oil and Vinegar Signature Scheme under Direct Attacks.- CyclicRainbow – A Multivariate Signature Scheme with a Partially Cyclic Public Key.- Security Analysis, Pseudorandom Permutations and Applications.- Combined Security Analysis of the One- and Three-Pass Unified Model Key Agreement Protocols.- Indifferentiability beyond the Birthday Bound for the Xor of Two Public Random Permutations.- The Characterization of Luby-Rackoff and Its Optimum Single-Key Variants.- Versatile Prêt à Voter: Handling Multiple Election Methods with a Unified Interface.- Invited Talk.- Cryptographic Hash Functions: Theory and Practice.- Hash Functions.- Cryptanalysis of Tav-128 Hash Function.- Near-Collisions for the Reduced Round Versions of Some Second Round SHA-3 Compression Functions Using Hill Climbing.- Speeding Up the Wide-Pipe: Secure and Fast Hashing.- Attacks on Block Ciphers and Stream Ciphers.- New Boomerang Attacks on ARIA.- Algebraic, AIDA/Cube and Side Channel Analysis of KATAN Family of Block Ciphers.- The Improbable Differential Attack: Cryptanalysis of Reduced Round CLEFIA.- Greedy Distinguishers and Nonrandomness Detectors.- Fast Cryptographic Computation.- Polynomial Multiplication over Binary Fields Using Charlier Polynomial Representation with Low Space Complexity.- Random Euclidean Addition Chain Generation and Its Application to Point Multiplication.- Cryptanalysis of AES.- Attack on a Higher-Order Masking of the AES Based on Homographic Functions.- Improved Impossible Differential Cryptanalysis of 7-Round AES-128.- Cryptanalysis ofa Perturbated White-Box AES Implementation.- Efficient Implementation.- A Program Generator for Intel AES-NI Instructions.- ECC2K-130 on NVIDIA GPUs.- One Byte per Clock: A Novel RC4 Hardware.