Cryptography and Coding
Editat de Martijn Stamen Limba Engleză Paperback – 29 noi 2013
Preț: 325.25 lei
Preț vechi: 406.57 lei
-20% Nou
Puncte Express: 488
Preț estimativ în valută:
57.54€ • 67.14$ • 50.31£
57.54€ • 67.14$ • 50.31£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642452383
ISBN-10: 3642452388
Pagini: 380
Ilustrații: XII, 365 p. 39 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:2013
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642452388
Pagini: 380
Ilustrații: XII, 365 p. 39 illus.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.58 kg
Ediția:2013
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Bits and Booleans.- Semi-bent Functions from Oval Polynomials.- Efficient Generation of Elementary Sequences.- Homomorphic Encryption.- On the Homomorphic Computation of Symmetric Cryptographic Primitives.- Improved Security for a Ring-Based Fully Homomorphic Encryption Scheme.- On the Relationship between Functional Encryption, Obfuscation and Fully Homomorphic Encryption.- Codes and Applications.- On Minimal and Quasi-minimal Linear Codes.- A Code-Based Undeniable Signature Scheme.- Cryptanalysis.- Filtered Nonlinear Cryptanalysis of Reduced-Round Serpent and the Wrong-Key Randomization Hypothesis.- Differential Cryptanalysis of Keccak Variants.- Recovering Private Keys Generated with Weak PRNGs.- Protecting against Leakage.- A Leakage-Resilient Pairing-Based Variant of the Schnorr Signature Scheme.- High-Order Masking by Using Coding Theory and Its Application to AES.- Hash Functions.- Hashing Mode Using a Lightweight Blockcipher.- Indifferentiability of Double Length Compression Functions.- Security Amplification against Meet-in-the-Middle Attacks Using Whitening.- Key Issues.- Secure Key Management in the Cloud.- Estimating Key Sizes for High Dimensional Lattice-Based Systems.- Sub-linear Blind Ring Signatures without Random Oracles.- Constructions of Signcryption in the Multi-user Setting from Identity-Based Encryption.- Anonymous Constant-Size Ciphertext HIBE from Asymmetric Pairings.