Cantitate/Preț
Produs

Theory of Cryptography: Third Theory of Cryptography Conference, TCC 2006, New York, NY, USA, March 4-7, 2006, Proceedings: Lecture Notes in Computer Science, cartea 3876

Editat de Shai Halevi, Tal Rabin
en Limba Engleză Paperback – 27 feb 2006

Din seria Lecture Notes in Computer Science

Preț: 64361 lei

Preț vechi: 75719 lei
-15% Nou

Puncte Express: 965

Preț estimativ în valută:
12321 12807$ 10216£

Carte tipărită la comandă

Livrare economică 05-19 februarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540327318
ISBN-10: 3540327312
Pagini: 620
Ilustrații: XIV, 622 p.
Dimensiuni: 155 x 235 x 27 mm
Greutate: 0.88 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Zero-Knowledge.- Concurrent Zero Knowledge Without Complexity Assumptions.- Interactive Zero-Knowledge with Restricted Random Oracles.- Non-interactive Zero-Knowledge from Homomorphic Encryption.- Primitives.- Ring Signatures: Stronger Definitions, and Constructions Without Random Oracles.- Efficient Blind and Partially Blind Signatures Without Random Oracles.- Key Exchange Using Passwords and Long Keys.- Mercurial Commitments: Minimal Assumptions and Efficient Constructions.- Assumptions and Models.- Efficient Collision-Resistant Hashing from Worst-Case Assumptions on Cyclic Lattices.- On Error Correction in the Exponent.- On the Relation Between the Ideal Cipher and the Random Oracle Models.- The Bounded-Retrieval Model.- Intrusion-Resilience Via the Bounded-Storage Model.- Perfectly Secure Password Protocols in the Bounded Retrieval Model.- Privacy.- Polylogarithmic Private Approximations and Efficient Matching.- Calibrating Noise to Sensitivity in Private Data Analysis.- Secret Sharing and Multi-party Computation (I).- Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation.- Efficient Multi-party Computation with Dispute Control.- Round-Optimal and Efficient Verifiable Secret Sharing.- Universally-Composible Security.- Generalized Environmental Security from Number Theoretic Assumptions.- Games and the Impossibility of Realizable Ideal Functionality.- Universally Composable Symbolic Analysis of Mutual Authentication and Key-Exchange Protocols.- Resource Fairness and Composability of Cryptographic Protocols.- One-Way Functions and Friends.- Finding Pessiland.- Pseudorandom Generators from One-Way Functions: A Simple Construction for Any Hardness.- On the Complexity of Parallel Hardness Amplification for One-Way Functions.- Secret Sharing and Multi-party Computation (II).- On Matroids and Non-ideal Secret Sharing.- Secure Computation with Partial Message Loss.- Communication Efficient Secure Linear Algebra.- Threshold and Proactive Pseudo-Random Permutations.- Pseudo-Random Functions and Encryption.- PRF Domain Extension Using DAGs.- Chosen-Ciphertext Security from Tag-Based Encryption.- Separating Sources for Encryption and Secret Sharing.