Cantitate/Preț
Produs

Progress in Cryptology – Mycrypt 2005: First International Conference on Cryptology in Malaysia, Kuala Lumpur, Malaysia, September 28-30, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3715

Editat de Ed Dawson, Serge Vaudenay
en Limba Engleză Paperback – 14 sep 2005

Din seria Lecture Notes in Computer Science

Preț: 38564 lei

Nou

Puncte Express: 578

Preț estimativ în valută:
7380 7666$ 6130£

Carte tipărită la comandă

Livrare economică 03-17 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540289388
ISBN-10: 3540289380
Pagini: 348
Ilustrații: XI, 329 p.
Dimensiuni: 155 x 235 x 18 mm
Greutate: 0.51 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Invited Talk I.- Trends and Challenges for Securer Cryptography in Practice.- Stream Ciphers Analysis.- Distinguishing Attacks on T-Functions.- Introducing a New Variant of Fast Algebraic Attacks and Minimizing Their Successive Data Complexity.- Cryptography Based on Combinatorics.- Equivalent Keys in HFE, C*, and Variations.- A New Structural Attack for GPT and Variants.- A Family of Fast Syndrome Based Cryptographic Hash Functions.- Cryptographic Protocols.- Optimization of Electronic First-Bid Sealed-Bid Auction Based on Homomorphic Secret Sharing.- Identity Based Delegation Network.- On Session Key Construction in Provably-Secure Key Establishment Protocols.- On the Security of Probabilistic Multisignature Schemes and Their Optimality.- Invited Talk II.- Efficient Secure Group Signatures with Dynamic Joins and Keeping Anonymity Against Group Managers.- Implementation Issues.- An Analysis of Double Base Number Systems and a Sublinear Scalar Multiplication Algorithm.- Power Analysis by Exploiting Chosen Message and Internal Collisions – Vulnerability of Checking Mechanism for RSA-Decryption.- Optimization of the MOVA Undeniable Signature Scheme.- Unconventional Cryptography.- Questionable Encryption and Its Applications.- Twin RSA.- Invited Talk III.- Security of Two-Party Identity-Based Key Agreement.- Block Cipher Cryptanalysis.- Related-Key Differential Attacks on Cobra-S128, Cobra-F64a, and Cobra-F64b.- Advanced Slide Attacks Revisited: Realigning Slide on DES.- New Multiset Attacks on Rijndael with Large Blocks.- Homomorphic Encryption.- Paillier’s Cryptosystem Modulo p 2 q and Its Applications to Trapdoor Commitment Schemes.- Homomorphic Cryptosystems Based on Subgroup Membership Problems.