Cantitate/Preț
Produs

Selected Areas in Cryptography: 7th Annual International Workshop, SAC 2000, Waterloo, Ontario, Canada, August 14-15, 2000. Proceedings: Lecture Notes in Computer Science, cartea 2012

Editat de Douglas R. Stinson, Stafford Tavares
en Limba Engleză Paperback – 25 apr 2001

Din seria Lecture Notes in Computer Science

Preț: 40548 lei

Nou

Puncte Express: 608

Preț estimativ în valută:
7759 8123$ 6420£

Carte tipărită la comandă

Livrare economică 05-19 aprilie

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540420699
ISBN-10: 354042069X
Pagini: 356
Ilustrații: IX, 347 p.
Dimensiuni: 155 x 235 x 19 mm
Greutate: 0.83 kg
Ediția:2001
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Cryptanalysis I.- Analysis of IS-95 CDMA Voice Privacy.- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.- Cryptanalysis of the “Augmented Family of Cryptographic Parity Circuits” Proposed at ISW’97.- Block Ciphers — New Designs.- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis.- DFCv2.- The Block Cipher Hierocrypt.- Symmetric Block Ciphers Based on Group Bases.- Elliptic Curves and Efficient Implementations.- Speeding up the Arithmetic on Koblitz Curves of Genus Two.- On Complexity of Polynomial Basis Squaring in F2m.- Security Protocols and Applications.- Dynamic Multi-threshold Metering Schemes.- Chained Stream Authentication.- A Global PMI for Electronic Content Distribution.- Block Ciphers and Hash Functions.- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers.- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case.- HAS-V: A New Hash Function with Variable Output Length.- Boolean Functions and Stream Ciphers.- On Welch-Gong Transformation Sequence Generators.- Modes of Operation of Stream Ciphers.- LILI Keystream Generator.- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.- Public Key Systems.- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract).- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract).- Cryptanalysis II.- Root Finding Interpolation Attack.- Differential Cryptanalysis of Reduced Rounds of GOST.- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.

Caracteristici

Includes supplementary material: sn.pub/extras