Information Security and Cryptology - ICISC'99
Editat de Jooseok Songen Limba Engleză Paperback – 12 apr 2000
Preț: 320.97 lei
Preț vechi: 401.21 lei
-20% Nou
Puncte Express: 481
Preț estimativ în valută:
56.80€ • 66.24$ • 49.87£
56.80€ • 66.24$ • 49.87£
Carte tipărită la comandă
Livrare economică 15-29 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540673804
ISBN-10: 3540673806
Pagini: 296
Ilustrații: XII, 284 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.45 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540673806
Pagini: 296
Ilustrații: XII, 284 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.45 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talk.- On Provable Security for Conventional Cryptography.- Cryptanalysis and Cryptographic Design.- Correlation Properties of the Bluetooth Combiner.- Preventing Double-Spent Coins from Revealing User’s Whole Secret.- On the Optimal Diffusion Layers with Practical Security against Differential and Linear Cryptanalysis.- Non-linear Complexity of the Naor–Reingold Pseudo-random Function.- Cryptographic Theory and Computation Complexity.- Relationships between Bent Functions and Complementary Plateaued Functions.- A Technique for Boosting the Security of Cryptographic Systems with One-Way Hash Functions.- Over F p vs. over F and on Pentium vs. on Alpha in Software Implementation of Hyperelliptic Curve Cryptosystems.- Speeding Up Elliptic Scalar Multiplication with Precomputation.- Cryptographic Protocol and Authentication Design.- Why Hierarchical Key Distribution Is Appropriate for Multicast Networks.- Secure Selection Protocols.- Efficient 3-Pass Password-Based Key Exchange Protocol with Low Computational Cost for Client.- A 2-Pass Authentication and Key Agreement Protocol for Mobile Communications.- Digital Signature and Secret Sharing Scheme.- Verifiable Secret Sharing and Time Capsules.- A New Approach to Robust Threshold RSA Signature Schemes.- On Threshold RSA-Signing with no Dealer.- A New Approach to Efficient Verifiable Secret Sharing for Threshold KCDSA Signature.- Electronic Cash, Application, Implementation.- A Hardware-Oriented Algorithm for Computing in Jacobians and Its Implementation for Hyperelliptic Curve Cryptosystems.- A Security Design for a Wide-Area Distributed System.- Self-Escrowed Public-Key Infrastructures.- Electronic Funds Transfer Protocol Using Domain-Verifiable Signcryption Scheme.
Caracteristici
Includes supplementary material: sn.pub/extras