Advances in Cryptology - ASIACRYPT 2001
Editat de Colin Boyden Limba Engleză Paperback – 28 noi 2001
Preț: 338.35 lei
Preț vechi: 422.94 lei
-20%
Puncte Express: 508
Preț estimativ în valută:
59.83€ • 68.61$ • 51.71£
59.83€ • 68.61$ • 51.71£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783540429876
ISBN-10: 3540429875
Pagini: 616
Ilustrații: XI, 601 p. 22 illus.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.92 kg
Ediția:2001
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540429875
Pagini: 616
Ilustrații: XI, 601 p. 22 illus.
Dimensiuni: 155 x 235 x 33 mm
Greutate: 0.92 kg
Ediția:2001
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Lattice Based Cryptography.- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.- On the Insecurity of a Server-Aided RSA Protocol.- The Modular Inversion Hidden Number Problem.- Human Identification.- Secure Human Identification Protocols.- Invited Talk.- Unbelievable Security Matching AES Security Using Public Key Systems.- Practical Public Key Cryptography.- A Probable Prime Test with Very High Confidence for n ? 1 mod 4.- Computation of Discrete Logarithms in .- Speeding Up XTR.- An Efficient Implementation of Braid Groups.- Cryptography Based on Coding Theory.- How to Achieve a McEliece-Based Digital Signature Scheme.- Efficient Traitor Tracing Algorithms Using List Decoding.- Block Ciphers.- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.- Known-IV Attacks on Triple Modes of Operation of Block Ciphers.- Generic Attacks on Feistel Schemes.- A Compact Rijndael Hardware Architecture with S-Box Optimization.- Provable Security.- Provable Security of KASUMI and 3GPP Encryption Mode f8.- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.- Provably Authenticated Group Diffie-Hellman Key Exchange — The Dynamic Case.- Threshold Cryptography.- Fully Distributed Threshold RSA under Standard Assumptions.- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes.- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.- Two-Party Protocols.- Oblivious Polynomial Evaluation and Oblivious Neural Learning.- Mutually Independent Commitments.- Zero Knowledge.- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank.- Responsive Round Complexity and Concurrent Zero-Knowledge.- CryptographicBuilding Blocks.- Practical Construction and Analysis of Pseudo-Randomness Primitives.- Autocorrelation Coefficients and Correlation Immunity of Boolean Functions.- Elliptic Curve Cryptography.- An Extension of Kedlaya’s Point-Counting Algorithm to Superelliptic Curves.- Supersingular Curves in Cryptography.- Short Signatures from the Weil Pairing.- Self-Blindable Credential Certificates from the Weil Pairing.- Anonymity.- How to Leak a Secret.- Key-Privacy in Public-Key Encryption.- Provably Secure air Blind Signatures with Tight Revocation.
Caracteristici
Includes supplementary material: sn.pub/extras