Advances in Cryptology - CRYPTO '89: Lecture Notes in Computer Science, cartea 435
Editat de Gilles Brassarden Limba Engleză Paperback – 18 iun 1990
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 360.89 lei
Preț vechi: 451.12 lei
-20%
Puncte Express: 541
Carte tipărită la comandă
Livrare economică 03-17 iunie
Specificații
ISBN-13: 9780387973173
ISBN-10: 0387973176
Pagini: 652
Ilustrații: XIII, 634 p.
Dimensiuni: 210 x 279 x 35 mm
Greutate: 1.56 kg
Ediția:1990
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:New York, NY, United States
ISBN-10: 0387973176
Pagini: 652
Ilustrații: XIII, 634 p.
Dimensiuni: 210 x 279 x 35 mm
Greutate: 1.56 kg
Ediția:1990
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:New York, NY, United States
Public țintă
ResearchCuprins
Opening session.- Keying the German Navy’s Enigma.- Making Conditionally Secure Cryptosystems Unconditionally Abuse-Free in a General Context.- On the Existence of Bit Commitment Schemes and Zero-Knowledge Proofs.- Why is cryptography harder than it looks?.- Problems with the Normal Use of Cryptography for Providing Security on Unclassified Networks.- The use of Encryption in Kerberos for Network Authentication.- UNIX Password Security - Ten Years Later.- Practical Problems with a Cryptographic Protection Scheme.- The Smart Diskette A Universal User Token and Personal Crypto-Engine.- Pseudo-randomness and Sequences.- On the Quadratic Spans of Periodic Sequences.- The Shortest Feedback Shift Register That Can Generate A Given Sequence.- Perfect Local Randomness in Pseudo-random Sequences.- Sparse Pseudorandom Distributions.- Bit Commitment Using Pseudo-Randomness.- Cryptanalysis and Implementation.- How to Predict Congruential Generators.- A Chosen Text Attack on The Modified Cryptographic Checksum Algorithm of Cohen and Huang.- On the Linear Consistency Test (LCT) in Cryptanalysis with Applications.- Batch RSA.- On the Implementation of Elliptic Curve Cryptosystems.- Signature and Authentication I.- New Paradigms for Digital Signatures and Message Authentication Based on Non-Interactive Zero Knowledge Proofs.- Undeniable Signatures.- Signature and Authentication II.- A Certified Digital Signature.- Efficient Identification and Signatures for Smart Cards.- A signature with shared verification scheme.- On-Line/Off-Line Digital Signatures.- Threshold schemes and Key management.- On the Classification of Ideal Secret Sharing Schemes.- Dynamic Threshold Scheme Based on the Definition of Cross-Product in an N-Dimensional Linear Space.- Secret Sharing Over Infinite Domains.-Threshold cryptosystems.- Flexible Access Control with Master Keys.- Key distribution and Network security.- Key Distribution Protocol for Digital Mobile Communication Systems.- A key exchange system based on real quadratic fields Extended abstract.- On Key Distribution Systems.- SDNS Architecture and End-to-end Encryption.- Fast computation.- A Survey of Hardware Implementations of RSA.- Modular Exponentiation Using Recursive Sums of Residues.- A Fast Modular-multiplication Algorithm based on a Higher Radix.- Addition Chain Heuristics.- How easy is collision search. New results and applications to DES.- Odds and ends.- A Design Principle for Hash Functions.- One Way Hash Functions and DES.- Properties of Cryptosystem PGM.- On the Construction of Block Ciphers Provably Secure and Not Relying on Any Unproved Hypotheses.- Disposable Zero-Knowledge Authentications and Their Applications to Untraceable Electronic Cash.- Zero-knowledge and Oblivious transfer.- Efficient Identification Schemes Using Two Prover Interactive Proofs.- On the concrete complexity of zero-knowledge proofs.- Zero Knowledge Proofs of Knowledge in Two Rounds.- Minimum Resource Zero-Knowledge Proofs.- Non-Interactive Oblivious Transfer and Applications.- Multiparty computation.- Multiparty Protocols Tolerating Half Faulty Processors.- Controlled Gradual Disclosure Schemes for Random Bits and Their Applications.- Multiparty Computation with Faulty Majority.- The Spymasters Double-Agent Problem.- Impromptu talks.- On the Structure of Secret Key Exchange Protocols.- An Efficient Identification Scheme Based on Permuted Kernels (extended abstract).- An Efficient Software Protection Scheme.- Good S-Boxes Are Easy To Find.- Covert Distributed Processing with Computer Viruses.- Progress in Data Security Standardisation.- The FEAL-8 Cryptosystem and a Call for Attack.- How to Explain Zero-Knowledge Protocols to Your Children.