Cantitate/Preț
Produs

Progress in Cryptology - AFRICACRYPT 2010

Editat de Daniel J. Bernstein, Tanja Lange
en Limba Engleză Paperback – 14 apr 2010

Preț: 32914 lei

Preț vechi: 41142 lei
-20% Nou

Puncte Express: 494

Preț estimativ în valută:
5826 6791$ 5095£

Carte tipărită la comandă

Livrare economică 20 ianuarie-03 februarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783642126772
ISBN-10: 3642126774
Pagini: 456
Ilustrații: XIII, 437 p. 43 illus.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.69 kg
Ediția:2010
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Professional/practitioner

Cuprins

Signatures.- A New RSA-Based Signature Scheme.- Fair Blind Signatures without Random Oracles.- Fair Partially Blind Signatures.- Attacks.- Parallel Shortest Lattice Vector Enumeration on Graphics Cards.- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over .- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.- Protocols.- Proofs of Restricted Shuffles.- Batch Range Proof for Practical Small Ranges.- Optimistic Fair Priced Oblivious Transfer.- Networks.- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.- Elliptic Curves.- Avoiding Full Extension Field Arithmetic in Pairing Computations.- ECC2K-130 on Cell CPUs.- Side-Channel Attacks and Fault Attacks.- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator.- Differential Fault Analysis of HC-128.- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.- Public-Key Encryption.- Strong Cryptography from Weak Secrets.- Efficient Unidirectional Proxy Re-Encryption.- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.- Keys and PUFs.- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.- Quantum Readout of Physical Unclonable Functions.- Ciphers and Hash Functions.- Parallelizing the Camellia and SMS4 Block Ciphers.- Improved Linear Differential Attacks on CubeHash.- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.

Caracteristici

Fast track conference proceeding Unique visibility State of the art research