Cantitate/Preț
Produs

Topics in Cryptology -- CT-RSA 2005: The Cryptographers' Track at the RSA Conference 2005, San Francisco, CA, USA, February 14-18, 2005, Proceedings: Lecture Notes in Computer Science, cartea 3376

Editat de Alfred John Menezes
en Limba Engleză Paperback – 24 ian 2005

Din seria Lecture Notes in Computer Science

Preț: 38422 lei

Nou

Puncte Express: 576

Preț estimativ în valută:
7354 7665$ 6122£

Carte tipărită la comandă

Livrare economică 06-20 ianuarie 25

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540243991
ISBN-10: 3540243992
Pagini: 400
Ilustrații: X, 390 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.59 kg
Ediția:2005
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology

Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Invited Talks.- Sub-linear Queries Statistical Databases: Privacy with Power.- Malicious Cryptography: Kleptographic Aspects.- Cryptanalysis.- Resistance of SNOW 2.0 Against Algebraic Attacks.- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.- Hold Your Sessions: An Attack on Java Session-Id Generation.- Update on SHA-1.- A Fast Correlation Attack on the Shrinking Generator.- Public-Key Encryption.- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.- A Generic Conversion with Optimal Redundancy.- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3.- Signature Schemes.- Foundations of Group Signatures: The Case of Dynamic Groups.- Time-Selective Convertible Undeniable Signatures.- Design Principles.- On Tolerant Cryptographic Constructions.- Password-Based Protocols.- Simple Password-Based Encrypted Key Exchange Protocols.- Hard Bits of the Discrete Log with Applications to Password Authentication.- Proofs for Two-Server Password Authentication.- Design and Analysis of Password-Based Key Derivation Functions.- Pairings.- A New Two-Party Identity-Based Authenticated Key Agreement.- Accumulators from Bilinear Pairings and Applications.- Computing the Tate Pairing.- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings.- Efficient and Secure Implementation.- A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.- CryptoGraphics: Secret Key Cryptography Using Graphics Cards.- Side-Channel Leakage of Masked CMOS Gates.- New Minimal Weight Representations for Left-to-Right Window Methods.

Caracteristici

Includes supplementary material: sn.pub/extras