Information Security and Cryptology - ICISC 2001
Editat de Kwangjo Kimen Limba Engleză Paperback – 6 mar 2002
Preț: 330.15 lei
Preț vechi: 412.69 lei
-20% Nou
Puncte Express: 495
Preț estimativ în valută:
58.42€ • 68.51$ • 51.31£
58.42€ • 68.51$ • 51.31£
Carte tipărită la comandă
Livrare economică 13-27 februarie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540433194
ISBN-10: 3540433198
Pagini: 476
Ilustrații: XIII, 460 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.72 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540433198
Pagini: 476
Ilustrații: XIII, 460 p.
Dimensiuni: 155 x 235 x 26 mm
Greutate: 0.72 kg
Ediția:2002
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Practical Security in Public-Key Cryptography.- A New Cryptanalytic Method Using the Distribution Characteristics of Substitution Distances.- Truncated Differential Cryptanalysis of Camellia.- Improved Impossible Differential Cryptanalysis of Rijndael and Crypton.- Cryptanalysis of Nonlinear Filter Generators with {0, 1}-Metric Viterbi Decoding.- An IND-CCA2 Public-Key Cryptosystem with Fast Decryption.- Improvement of Probabilistic Public Key Cryptosystems Using Discrete Logarithm.- Design and Analysis of Fast Provably Secure Public-Key Cryptosystems Based on a Modular Squaring.- Concrete Security Analysis of CTR-OFB and CTR-CFB Modes of Operation.- Decentralized Event Correlation for Intrusion Detection.- Enhancing the Security of Cookies.- A New Stack Buffer Overflow Hacking Defense Technique with Memory Address Confirmation.- Efficient Revocation Schemes for Secure Multicast.- Binary Codes for Collusion-Secure Fingerprinting.- Copyright Protection of Object-Oriented Software.- Off-Line Authentication Using Watermarks.- Slide Attacks with a Known-Plaintext Cryptanalysis.- Constructions of Cheating Immune Secret Sharing.- Private Computation with Shared Randomness over Broadcast Channel.- An Optimistic Multi-party Fair Exchange Protocol with Reduced Trust Requirements.- Practical Reasoning about Accountability in Electronic Commerce Protocols.- Content Extraction Signatures.- New Signcryption Schemes Based on KCDSA.- An Efficient and Provably Secure Threshold Blind Signature.- A Multi-signature Scheme with Signers’ Intentions Secure against Active Attacks.- A Distributed Light-Weight Authentication Model for Ad-hoc Networks.- Design of an Authentication Protocol for Gsm Javacards.- Secure Authorisation Agent for Cross-Domain Access Control in a Mobile ComputingEnvironment.- Protecting General Flexible Itineraries of Mobile Agents.- RSA Speedup with Residue Number System Immune against Hardware Fault Cryptanalysis.- A Countermeasure against One Physical Cryptanalysis May Benefit Another Attack.- A Fast Scalar Multiplication Method with Randomized Projective Coordinates on a Montgomery-Form Elliptic Curve Secure against Side Channel Attacks.- DPA Countermeasure Based on the “Masking Method”.
Caracteristici
Includes supplementary material: sn.pub/extras