Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12. 2005, Proceedings: Lecture Notes in Computer Science, cartea 3378
Editat de Joe Kilianen Limba Engleză Paperback – 31 ian 2005
Din seria Lecture Notes in Computer Science
- 15% Preț: 549.48 lei
- 20% Preț: 322.44 lei
- 20% Preț: 324.00 lei
- 20% Preț: 315.78 lei
- 20% Preț: 238.01 lei
- 20% Preț: 1017.66 lei
- 20% Preț: 322.44 lei
- 20% Preț: 438.69 lei
- 20% Preț: 548.35 lei
- 20% Preț: 325.58 lei
- 20% Preț: 148.66 lei
- 20% Preț: 310.26 lei
- 20% Preț: 315.19 lei
- 20% Preț: 1005.39 lei
- 20% Preț: 554.59 lei
- 17% Preț: 360.19 lei
- 20% Preț: 620.45 lei
- 20% Preț: 307.71 lei
- 20% Preț: 1120.51 lei
- 20% Preț: 560.32 lei
- 20% Preț: 611.22 lei
- 20% Preț: 319.10 lei
- 20% Preț: 552.64 lei
- 20% Preț: 607.39 lei
- 20% Preț: 538.29 lei
- 20% Preț: 1339.86 lei
- 20% Preț: 172.69 lei
- 20% Preț: 315.78 lei
- Preț: 361.23 lei
- 20% Preț: 969.58 lei
- 20% Preț: 256.27 lei
- 20% Preț: 782.28 lei
- 20% Preț: 301.95 lei
- 20% Preț: 504.57 lei
- 20% Preț: 722.90 lei
- 20% Preț: 369.12 lei
- 20% Preț: 334.72 lei
- 20% Preț: 550.29 lei
- Preț: 389.06 lei
- 20% Preț: 564.99 lei
- 20% Preț: 552.25 lei
- 20% Preț: 552.25 lei
- 20% Preț: 722.40 lei
- 20% Preț: 331.59 lei
- 20% Preț: 309.90 lei
- 20% Preț: 122.89 lei
Preț: 622.58 lei
Preț vechi: 732.45 lei
-15% Nou
Puncte Express: 934
Preț estimativ în valută:
119.18€ • 129.83$ • 99.98£
119.18€ • 129.83$ • 99.98£
Carte tipărită la comandă
Livrare economică 19 decembrie 24 - 02 ianuarie 25
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540245735
ISBN-10: 3540245731
Pagini: 640
Ilustrații: XII, 628 p.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.89 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540245731
Pagini: 640
Ilustrații: XII, 628 p.
Dimensiuni: 155 x 235 x 34 mm
Greutate: 0.89 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Hardness Amplification and Error Correction.- Optimal Error Correction Against Computationally Bounded Noise.- Hardness Amplification of Weakly Verifiable Puzzles.- On Hardness Amplification of One-Way Functions.- Graphs and Groups.- Cryptography in Subgroups of .- Efficiently Constructible Huge Graphs That Preserve First Order Properties of Random Graphs.- Simulation and Secure Computation.- Comparing Two Notions of Simulatability.- Relaxing Environmental Security: Monitored Functionalities and Client-Server Computation.- Handling Expected Polynomial-Time Strategies in Simulation-Based Security Proofs.- Security of Encryption.- Adaptively-Secure, Non-interactive Public-Key Encryption.- Adaptive Security of Symbolic Encryption.- Chosen-Ciphertext Security of Multiple Encryption.- Steganography and Zero Knowledge.- Public-Key Steganography with Active Attacks.- Upper and Lower Bounds on Black-Box Steganography.- Fair-Zero Knowledge.- Secure Computation I.- How to Securely Outsource Cryptographic Computations.- Secure Computation of the Mean and Related Statistics.- Keyword Search and Oblivious Pseudorandom Functions.- Secure Computation II.- Evaluating 2-DNF Formulas on Ciphertexts.- Share Conversion, Pseudorandom Secret-Sharing and Applications to Secure Computation.- Toward Privacy in Public Databases.- Quantum Cryptography and Universal Composability.- The Universal Composable Security of Quantum Key Distribution.- Universally Composable Privacy Amplification Against Quantum Adversaries.- A Universally Composable Secure Channel Based on the KEM-DEM Framework.- Cryptographic Primitives and Security.- Sufficient Conditions for Collision-Resistant Hashing.- The Relationship Between Password-Authenticated Key Exchange and Other Cryptographic Primitives.- On the Relationships Between Notions of Simulation-Based Security.- Encryption and Signatures.- A New Cramer-Shoup Like Methodology for Group Based Provably Secure Encryption Schemes.- Further Simplifications in Proactive RSA Signatures.- Proof of Plaintext Knowledge for the Ajtai-Dwork Cryptosystem.- Information Theoretic Cryptography.- Entropic Security and the Encryption of High Entropy Messages.- Error Correction in the Bounded Storage Model.- Characterizing Ideal Weighted Threshold Secret Sharing.