Progress in Cryptology - INDOCRYPT 2004
Editat de Anne Canteaut, Kapaleeswaran Viswanathanen Limba Engleză Paperback – 13 dec 2004
Preț: 328.94 lei
Preț vechi: 411.17 lei
-20% Nou
Puncte Express: 493
Preț estimativ în valută:
58.21€ • 67.88$ • 51.11£
58.21€ • 67.88$ • 51.11£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540241300
ISBN-10: 3540241302
Pagini: 452
Ilustrații: XIV, 431 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.68 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540241302
Pagini: 452
Ilustrații: XIV, 431 p.
Dimensiuni: 155 x 235 x 25 mm
Greutate: 0.68 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Design of Secure Key Establishment Protocols: Successes, Failures and Prospects.- Secure Protocols for Complex Tasks in Complex Environments.- Cryptographic Protocols.- Tripartite Key Exchange in the Canetti-Krawczyk Proof Model.- The Marriage Proposals Problem: Fair and Efficient Solution for Two-Party Computations.- Applications.- On the Security of a Certified E-Mail Scheme.- Multiplicative Homomorphic E-Voting.- Stream Ciphers.- Chosen Ciphertext Attack on a New Class of Self-Synchronizing Stream Ciphers.- Algebraic Attacks over GF(q).- Cryptographic Boolean Functions.- Results on Algebraic Immunity for Cryptographically Significant Boolean Functions.- Generalized Boolean Bent Functions.- On Boolean Functions with Generalized Cryptographic Properties.- Foundations.- Information Theory and the Security of Binary Data Perturbation.- Symmetric Authentication Codes with Secrecy and Unconditionally Secure Authenticated Encryption.- Block Ciphers.- Faster Variants of the MESH Block Ciphers.- Related-Key Attacks on Reduced Rounds of SHACAL-2.- Related-Key Attacks on DDP Based Ciphers: CIKS-128 and CIKS-128H.- Cryptanalysis of Ake98.- Public Key Encryption.- Designing an Efficient and Secure Public-Key Cryptosystem Based on Reducible Rank Codes.- HEAD: Hybrid Encryption with Delegated Decryption Capability.- A Provably Secure Elliptic Curve Scheme with Fast Encryption.- Efficient Representations.- Advances in Alternative Non-adjacent Form Representations.- Public Key Cryptanalysis.- Attacks on Public Key Cryptosystems Based on Free Partially Commutative Monoids and Groups.- Exact Analysis of Montgomery Multiplication.- Cryptography, Connections, Cocycles and Crystals: A p-Adic Exploration of the Discrete Logarithm Problem.- Modes of Operation.- EME*: Extending EME to Handle Arbitrary-Length Messages with Associated Data.- Impossibility of Construction of OWHF and UOWHF from PGV Model Based on Block Cipher Secure Against ACPCA.- The Security and Performance of the Galois/Counter Mode (GCM) of Operation.- Signatures.- Revisiting Fully Distributed Proxy Signature Schemes.- New ID-Based Threshold Signature Scheme from Bilinear Pairings.- Separable Linkable Threshold Ring Signatures.- Traitor Tracing and Visual Cryptography.- A New Black and White Visual Cryptographic Scheme for General Access Structures.- Identification Algorithms for Sequential Traitor Tracing.