Information Security and Cryptology - ICISC 2014: Lecture Notes in Computer Science
Editat de Jooyoung Lee, Jongsung Kimen Limba Engleză Paperback – 27 mar 2015
Din seria Lecture Notes in Computer Science
- 20%
Preț: 1020.28 lei -
Preț: 395.25 lei - 20%
Preț: 327.36 lei - 20%
Preț: 556.96 lei - 20%
Preț: 400.77 lei - 15%
Preț: 558.12 lei - 20%
Preț: 328.94 lei - 20%
Preț: 340.04 lei - 20%
Preț: 487.46 lei - 20%
Preț: 629.71 lei - 20%
Preț: 386.08 lei - 20%
Preț: 489.11 lei - 20%
Preț: 620.33 lei - 20%
Preț: 733.68 lei - 20%
Preț: 1033.45 lei - 20%
Preț: 782.57 lei - 20%
Preț: 679.09 lei - 20%
Preț: 330.54 lei - 20%
Preț: 1137.10 lei - 20%
Preț: 435.28 lei - 20%
Preț: 375.72 lei - 20%
Preț: 342.61 lei - 20%
Preț: 432.78 lei - 20%
Preț: 904.16 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 373.80 lei - 20%
Preț: 400.17 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 984.64 lei - 20%
Preț: 560.93 lei - 20%
Preț: 731.97 lei - 20%
Preț: 563.29 lei - 20%
Preț: 403.00 lei - 20%
Preț: 793.92 lei - 20%
Preț: 324.19 lei - 20%
Preț: 733.68 lei - 20%
Preț: 336.86 lei - 20%
Preț: 327.36 lei - 20%
Preț: 573.45 lei - 20%
Preț: 558.53 lei - 20%
Preț: 850.42 lei - 20%
Preț: 560.93 lei - 20%
Preț: 560.93 lei - 20%
Preț: 631.96 lei - 20%
Preț: 568.70 lei - 20%
Preț: 488.90 lei - 20%
Preț: 293.24 lei
Preț: 329.56 lei
Preț vechi: 411.95 lei
-20%
Puncte Express: 494
Preț estimativ în valută:
58.30€ • 68.74$ • 50.64£
58.30€ • 68.74$ • 50.64£
Carte tipărită la comandă
Livrare economică 24 martie-07 aprilie
Specificații
ISBN-13: 9783319159423
ISBN-10: 3319159429
Pagini: 464
Ilustrații: XIII, 448 p. 83 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.7 kg
Ediția:2015
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
ISBN-10: 3319159429
Pagini: 464
Ilustrații: XIII, 448 p. 83 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.7 kg
Ediția:2015
Editura: Springer
Seria Lecture Notes in Computer Science
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
General Bounds for Small Inverse Problems and Its Applications to Multi-Prime RSA.- On the Security of Distributed Multiprime RSA.- Formal Modeling of Random Oracle Programmability and Verification of Signature Unforgeability Using Task-PIOAs.- Algebraic Cryptanalysis of Yasuda, Takagi and Sakurai’s Signature Scheme.- Discrete Logarithms for Torsion Points on Elliptic Curve of Embedding Degree 1.- Efficient Key Dependent Message Security Amplification Against Chosen Ciphertext Attacks.- A Fast Phase-Based Enumeration Algorithm for SVP Challenge Through y-Sparse Representations of Short Lattice Vectors.- How Much Can Complexity of Linear Cryptanalysis Be Reduced?.- Format-Preserving Encryption Algorithms Using Families of Tweakable Blockciphers.- Bicliques with Minimal Data and Time Complexity for AES.- Fault Analysis on SIMON Family of Lightweight Block Ciphers.- A Clustering Approach for Privacy-Preserving in Social Networks.- Securely Solving Classical Network Flow Problems.- Remote IP Protection Using Timing Channels.- Detecting Camouflaged Applications on Mobile Application Markets.- WrapDroid: Flexible and Fine-Grained Scheme Towards Regulating Behaviors of Android Apps.- A Collision Attack on a Double-Block-Length Compression Function Instantiated with Round-Reduced AES-256.- LSH: A New Fast Secure Hash Function Family.- Lossless Data Hiding for Binary Document Images Using n-Pairs Pattern.- Montgomery Modular Multiplication on ARM-NEON Revisited.- A Fair and Efficient Mutual Private Set Intersection Protocol from a Two-Way Oblivious Pseudorandom Function.- Security Analysis of Polynomial Interpolation-Based Distributed Oblivious Transfer Protocols.- Compact and Efficient UC Commitments Under Atomic-Exchanges.- Issuer-Free Adaptive Oblivious Transfer with Access Policy.- Memory Address Side-Channel Analysis on Exponentiation.- Mutant Differential Fault Analysis of Trivium MDFA.
Caracteristici
Includes supplementary material: sn.pub/extras