Public Key Cryptography - PKC 2010: 13th International Conference on Practice and Theory in Public Key Cryptography, Paris, France, May 26-28, 2010, Proceedings: Lecture Notes in Computer Science, cartea 6056
Editat de Phong Q. Nguyen, David Pointchevalen Limba Engleză Paperback – 20 mai 2010
Din seria Lecture Notes in Computer Science
- 20% Preț: 571.63 lei
- 20% Preț: 336.71 lei
- 20% Preț: 333.46 lei
- 20% Preț: 662.76 lei
- 20% Preț: 330.23 lei
- 20% Preț: 747.79 lei
- 20% Preț: 438.67 lei
- 20% Preț: 369.12 lei
- 20% Preț: 315.76 lei
- 20% Preț: 584.40 lei
- 20% Preț: 148.66 lei
- 20% Preț: 122.89 lei
- 20% Preț: 315.18 lei
- 20% Preț: 256.26 lei
- 20% Preț: 1040.03 lei
- 20% Preț: 504.56 lei
- Preț: 402.62 lei
- 20% Preț: 346.40 lei
- 20% Preț: 301.94 lei
- 20% Preț: 237.99 lei
- 5% Preț: 365.59 lei
- 20% Preț: 309.89 lei
- 20% Preț: 321.95 lei
- 20% Preț: 310.25 lei
- 20% Preț: 334.68 lei
- Preț: 373.56 lei
- 20% Preț: 172.68 lei
- 20% Preț: 1386.07 lei
- 20% Preț: 315.76 lei
- 20% Preț: 1003.66 lei
- 20% Preț: 444.17 lei
- 20% Preț: 567.60 lei
- 20% Preț: 632.22 lei
- 17% Preț: 360.18 lei
- 20% Preț: 538.28 lei
- 20% Preț: 335.08 lei
- 20% Preț: 307.68 lei
- 20% Preț: 343.16 lei
- 20% Preț: 641.78 lei
- 20% Preț: 579.56 lei
- 20% Preț: 1053.45 lei
- 15% Preț: 568.74 lei
- Preț: 389.47 lei
- 20% Preț: 333.46 lei
- 20% Preț: 607.38 lei
- 20% Preț: 326.97 lei
Preț: 534.30 lei
Preț vechi: 667.88 lei
-20% Nou
Puncte Express: 801
Preț estimativ în valută:
102.24€ • 107.56$ • 84.65£
102.24€ • 107.56$ • 84.65£
Carte disponibilă
Livrare economică 24 decembrie 24 - 07 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642130120
ISBN-10: 3642130127
Pagini: 532
Ilustrații: XIII, 519 p. 34 illus.
Greutate: 0.79 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642130127
Pagini: 532
Ilustrații: XIII, 519 p. 34 illus.
Greutate: 0.79 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Encryption I.- Simple and Efficient Public-Key Encryption from Computational Diffie-Hellman in the Standard Model.- Constant Size Ciphertexts in Threshold Attribute-Based Encryption.- Cryptanalysis.- Algebraic Cryptanalysis of the PKC’2009 Algebraic Surface Cryptosystem.- Maximizing Small Root Bounds by Linearization and Applications to Small Secret Exponent RSA.- Implicit Factoring with Shared Most Significant and Middle Bits.- Protocols I.- On the Feasibility of Consistent Computations.- Multi-query Computationally-Private Information Retrieval with Constant Communication Rate.- Further Observations on Optimistic Fair Exchange Protocols in the Multi-user Setting.- Network Coding.- Secure Network Coding over the Integers.- Preventing Pollution Attacks in Multi-source Network Coding.- Tools.- Groth–Sahai Proofs Revisited.- Constant-Round Concurrent Non-Malleable Statistically Binding Commitments and Decommitments.- Elliptic Curves.- Faster Squaring in the Cyclotomic Subgroup of Sixth Degree Extensions.- Faster Pairing Computations on Curves with High-Degree Twists.- Efficient Arithmetic on Hessian Curves.- Lossy Trapdoor Functions.- CCA Proxy Re-Encryption without Bilinear Maps in the Standard Model.- More Constructions of Lossy and Correlation-Secure Trapdoor Functions.- Chosen-Ciphertext Security from Slightly Lossy Trapdoor Functions.- Protocols II.- Efficient Set Operations in the Presence of Malicious Adversaries.- Text Search Protocols with Simulation Based Security.- Discrete Logarithm.- Solving a 676-Bit Discrete Logarithm Problem in GF(36n ).- Using Equivalence Classes to Accelerate Solving the Discrete Logarithm Problem in a Short Interval.- Encryption II.- Functional Encryption for Inner Product: Achieving Constant-Size Ciphertexts with Adaptive Securityor Support for Negation.- Security of Encryption Schemes in Weakened Random Oracle Models.- Fully Homomorphic Encryption with Relatively Small Key and Ciphertext Sizes.- Signatures.- Unlinkability of Sanitizable Signatures.- Confidential Signatures and Deterministic Signcryption.- Identity-Based Aggregate and Multi-Signature Schemes Based on RSA.- Lattice Mixing and Vanishing Trapdoors: A Framework for Fully Secure Short Signatures and More.