Information Security and Cryptology - ICISC 2000
Editat de Dongho Wonen Limba Engleză Paperback – 14 mar 2001
Preț: 320.93 lei
Preț vechi: 401.17 lei
-20%
Puncte Express: 481
Preț estimativ în valută:
56.75€ • 65.08$ • 49.05£
56.75€ • 65.08$ • 49.05£
Carte tipărită la comandă
Livrare economică 27 aprilie-11 mai
Specificații
ISBN-13: 9783540417828
ISBN-10: 3540417826
Pagini: 276
Ilustrații: X, 266 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:2001
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540417826
Pagini: 276
Ilustrații: X, 266 p.
Dimensiuni: 155 x 235 x 16 mm
Greutate: 0.42 kg
Ediția:2001
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures.- On the strength of KASUMI without FL functions against Higher Order Differential Attack.- On MISTY1 Higher Order Differential Cryptanalysis.- Difference Distribution Attack on DONUT and Improved DONUT.- New Results on Correlation Immunity.- Elliptic Curves and Resilient Functions.- Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction.- Characterization of Elliptic Curve Traces Under FR-Reduction.- A Multi-party Optimistic Non-repudiation Protocol.- Secure Matchmaking Protocol.- An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA.- Efficient and Secure Member Deletion in Group Signature Schemes.- An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.- An Internet Anonymous Auction Scheme.- Efficient Sealed-bid Auction using Hash Chain.- Micropayments for Wireless Communications.- Cryptographic Applications of Sparse Polynomials over Finite Rings.- Efficient anonymous fingerprinting of electronic information with improved automation with improved automatic identification of redistributors.- Hash to the Rescue: Space Minimization for PKI Directories.- A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management.
Caracteristici
Includes supplementary material: sn.pub/extras