Cantitate/Preț
Produs

Selected Areas in Cryptography: 13th International Workshop, SAC 2006, Montreal, Canada, August 17-18, 2006, Revised Selected Papers: Lecture Notes in Computer Science, cartea 4356

Editat de Eli Biham, Amr M. Youssef
en Limba Engleză Paperback – 21 sep 2007

Din seria Lecture Notes in Computer Science

Preț: 38586 lei

Nou

Puncte Express: 579

Preț estimativ în valută:
7385 7697$ 6148£

Carte tipărită la comandă

Livrare economică 06-20 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540744610
ISBN-10: 3540744614
Pagini: 406
Ilustrații: XI, 395 p.
Dimensiuni: 155 x 235 x 29 mm
Greutate: 0.63 kg
Ediția:2007
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Block Cipher Cryptanalysis.- Improved DST Cryptanalysis of IDEA.- Improved Related-Key Impossible Differential Attacks on Reduced-Round AES-192.- Related-Key Rectangle Attack on the Full SHACAL-1.- Stream Cipher Cryptanalysis I.- Cryptanalysis of Achterbahn-Version 2.- Cryptanalysis of the Stream Cipher ABC v2.- The Design of a Stream Cipher LEX.- Dial C for Cipher.- Improved Security Analysis of XEX and LRW Modes.- Extended Hidden Number Problem and Its Cryptanalytic Applications.- Changing the Odds Against Masked Logic.- Advances on Access-Driven Cache Attacks on AES.- Blind Differential Cryptanalysis for Enhanced Power Attacks.- Efficient Implementations I.- Efficient Implementations of Multivariate Quadratic Systems.- Unbridle the Bit-Length of a Crypto-coprocessor with Montgomery Multiplication.- Delaying and Merging Operations in Scalar Multiplication: Applications to Curve-Based Cryptosystems.- Stream Cipher Cryptanalysis II.- On the Problem of Finding Linear Approximations and Cryptanalysis of Pomaranch Version 2.- Multi-pass Fast Correlation Attack on Stream Ciphers.- Crossword Puzzle Attack on NLS.- Invited Talk.- When Stream Cipher Analysis Meets Public-Key Cryptography.- Efficient Implementations II.- On Redundant ?-Adic Expansions and Non-adjacent Digit Sets.- Pairing Calculation on Supersingular Genus 2 Curves.- Efficient Divisor Class Halving on Genus Two Curves.- Message Authentication on 64-Bit Architectures.- Some Notes on the Security of the Timed Efficient Stream Loss-Tolerant Authentication Scheme.- Constructing an Ideal Hash Function from Weak Ideal Compression Functions.- Provably Good Codes for Hash Function Design.