Information Security and Cryptology - ICISC 2014: Lecture Notes in Computer Science, cartea 8949
Editat de Jooyoung Lee, Jongsung Kimen Limba Engleză Paperback – 27 mar 2015
Din seria Lecture Notes in Computer Science
- 20%
Preț: 558.53 lei - 20%
Preț: 571.88 lei - 20%
Preț: 675.83 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 620.33 lei - 20%
Preț: 560.93 lei - 20%
Preț: 633.70 lei - 20%
Preț: 678.21 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 560.93 lei - 20%
Preț: 733.68 lei - 20%
Preț: 793.92 lei - 15%
Preț: 558.12 lei - 20%
Preț: 793.92 lei - 20%
Preț: 560.93 lei - 20%
Preț: 748.63 lei - 20%
Preț: 562.49 lei - 20%
Preț: 1246.46 lei - 20%
Preț: 449.81 lei - 20%
Preț: 556.96 lei - 20%
Preț: 562.49 lei - 20%
Preț: 851.78 lei - 20%
Preț: 313.10 lei - 18%
Preț: 945.44 lei - 20%
Preț: 314.86 lei - 20%
Preț: 560.93 lei - 20%
Preț: 313.87 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 563.29 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 735.28 lei - 20%
Preț: 1079.23 lei - 20%
Preț: 560.11 lei - 20%
Preț: 791.54 lei - 15%
Preț: 672.87 lei - 20%
Preț: 1032.47 lei - 20%
Preț: 617.17 lei - 20%
Preț: 1022.15 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 979.25 lei - 20%
Preț: 402.28 lei - 20%
Preț: 316.28 lei - 20%
Preț: 636.06 lei - 20%
Preț: 320.24 lei - 20%
Preț: 328.94 lei
Preț: 330.58 lei
Preț vechi: 413.22 lei
-20%
Puncte Express: 496
Carte tipărită la comandă
Livrare economică 03-17 iunie
Specificații
ISBN-13: 9783319159423
ISBN-10: 3319159429
Pagini: 464
Ilustrații: XIII, 448 p. 83 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.7 kg
Ediția:2015
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3319159429
Pagini: 464
Ilustrații: XIII, 448 p. 83 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.7 kg
Ediția:2015
Editura: Springer
Colecția Lecture Notes in Computer Science
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA.- On the Security of Distributed Multiprime RSA.- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs.- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme.- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1.- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.- A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors.- How Much Can Complexity of Linear Cryptanalysis Be Reduced?.- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers.- Bicliques with Minimal Data and Time Complexity for AES.- Fault Analysis on SIMON Family of Lightweight Block Ciphers.- A Clustering Approach for Privacy-Preserving in Social Networks.- Securely Solving Classical Network Flow Problems.- Remote IP Protection Using Timing Channels.- Detecting Camouflaged Applications on Mobile Application Markets.- WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.- LSH: A New Fast Secure Hash Function Family.- Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern.- Montgomery Modular Multiplication on ARM-NEON Revisited.- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function.- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols.- Compact and Efficient UC Commitments Under Atomic-Exchanges.- Issuer-Free Adaptive Oblivious Transfer with Access Policy.- Memory Address Side-Channel Analysis on Exponentiation.- Mutant Differential Fault Analysis of Trivium MDFA.