Progress in Cryptology - INDOCRYPT 2000
Editat de Bimal Kumar Roy, Eiji Okamotoen Limba Engleză Paperback – 29 noi 2000
Preț: 321.81 lei
Preț vechi: 402.26 lei
-20% Nou
Puncte Express: 483
Preț estimativ în valută:
56.94€ • 66.33$ • 49.72£
56.94€ • 66.33$ • 49.72£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540414520
ISBN-10: 3540414525
Pagini: 312
Ilustrații: X, 302 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.48 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540414525
Pagini: 312
Ilustrații: X, 302 p.
Dimensiuni: 155 x 235 x 17 mm
Greutate: 0.48 kg
Ediția:2000
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Stream Ciphers and Boolean Functions.- The Correlation of a Boolean Function with Its Variables.- On Choice of Connection-Polynomials for LFSR-Based Stream Ciphers.- On Resilient Boolean Functions with Maximal Possible Nonlinearity.- Cryptanalysis I : Stream Ciphers.- Decimation Attack of Stream Ciphers.- Cryptanalysis of the A5/1 GSM Stream Cipher.- Cryptanalysis II : Block Ciphers.- On Bias Estimation in Linear Cryptanalysis.- On the Incomparability of Entropy and Marginal Guesswork in Brute-Force Attacks.- Improved Impossible Differentials on Twofish.- Electronic Cash & Multiparty Computation.- An Online, Transferable E-Cash Payment System.- Anonymity Control in Multi-bank E-Cash System.- Efficient Asynchronous Secure Multiparty Distributed Computation.- Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation.- Digital Signatures.- Codes Identifying Bad Signatures in Batches.- Distributed Signcryption.- Fail-Stop Signature for Long Messages (Extended Abstract).- Elliptic Curves.- Power Analysis Breaks Elliptic Curve Cryptosystems Even Secure against the Timing Attack.- Efficient Construction of Cryptographically Strong Elliptic Curves.- Fast Arithmetic.- High-Speed Software Multiplication in F2m.- On Efficient Normal Basis Multiplication.- Cryptographic Protocols.- Symmetrically Private Information Retrieval.- Two-Pass Authenticated Key Agreement Protocol with Key Confirmation.- Anonymous Traceability Schemes with Unconditional Security.- Block Ciphers & Public Key Cryptography.- New Block Cipher DONUT Using Pairwise Perfect Decorrelation.- Generating RSA Keys on a Handheld Using an Untrusted Server.- A Generalized Takagi-Cryptosystem with a Modulus of the Form prqs.
Caracteristici
Includes supplementary material: sn.pub/extras