Advances in Cryptology
Editat de G. R. Blakely, D. Chaumen Limba Engleză Paperback – iul 1985
Preț: 331.80 lei
Preț vechi: 414.75 lei
-20% Nou
Puncte Express: 498
Preț estimativ în valută:
58.71€ • 68.85$ • 51.56£
58.71€ • 68.85$ • 51.56£
Carte tipărită la comandă
Livrare economică 12-26 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540156581
ISBN-10: 3540156585
Pagini: 508
Ilustrații: XII, 496 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:1985
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540156585
Pagini: 508
Ilustrații: XII, 496 p.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.76 kg
Ediția:1985
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Public Key Cryptosystems and Signatures.- A Prototype Encryption System Using Public Key.- A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms.- A Public-Key Cryptosystem Based on the Word Problem.- Efficient Signature Schemes Based on Polynomial Equations (preliminary version).- Identity-Based Cryptosystems and Signature Schemes.- A Knapsack Type Public Key Cryptosystem Based On Arithmetic in Finite Fields (preliminary draft).- Some Public-Key Crypto-Functions as Intractable as Factorization.- Cryptosystems and Other Hard Problems.- Computing Logarithms in GF (2n).- Wyner’s Analog Encryption Scheme: Results of a Simulation.- On Rotation Group and Encryption of Analog Signals.- The History of Book Ciphers.- An Update on Factorization at Sandia National Laboratories.- An LSI Digital Encryption Processor (DEP).- Efficient hardware and software implementations for the DES.- Efficient hardware implementation of the DES.- A Self-Synchronizing Cascaded Cipher System with Dynamic Control of Error Propagation.- Randomness and Its Concomitants.- Efficient and Secure Pseudo-Random Number Generation (Extended Abstract).- An LSI Random Number Generator (RNG).- Generalized Linear Threshold Scheme.- Security of Ramp Schemes.- A Fast Pseudo Random Permutation Generator With Applications to Cryptology.- On the Cryptographic Applications of Random Functions (Extended Abstract).- An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information.- Analysis and Cryptanalysis.- RSA/Rabin least significant bits are secure (Extended Abstract).- Information Theory without the Finiteness Assumption, I: Cryptosystems as Group-Theoretic Objects.- Cryptanalysis of Adfgvx Encipherment Systems.- Breaking Iterated Knapsacks.- Dependence ofoutput on input in DES: Small avalanche characteristics.- Des has no Per Round Linear Factors.- Protocols and Authentication.- A Message Authenticator Algorithm Suitable for a Mainframe Computer.- Key Management for Secure Electronic Funds Transfer in a Retail Environment.- Authentication Theory/Coding Theory.- New Secret Codes Can Prevent a Computerized Big Brother.- Fair Exchange of Secrets (extended abstract).- Cryptoprotocols: Subscription to a Public Key, The Secret Blocking and The Multi-Player Mental Poker Game (extended abstract).- Poker Protocols.- Impromptu Talks.- A “Paradoxical” Solution to The Signature Problem.- Sequence Complexity as a Test for Cryptographic Systems.- An Update on Quantum Cryptography.- How to Keep a Secret Alive.