Progress in Cryptology - INDOCRYPT 2006: 7th International Conference on Cryptology in India, Kolkata, India, December 11-13, 2006, Proceedings: Lecture Notes in Computer Science, cartea 4329
Editat de Rana Barua, Tanja Langeen Limba Engleză Paperback – 27 noi 2006
Din seria Lecture Notes in Computer Science
- 20%
Preț: 400.77 lei - 20%
Preț: 754.11 lei - 20%
Preț: 324.19 lei - 20%
Preț: 373.80 lei - 20%
Preț: 342.61 lei - 20%
Preț: 403.00 lei - 20%
Preț: 573.45 lei -
Preț: 395.25 lei - 20%
Preț: 487.46 lei - 20%
Preț: 355.27 lei - 20%
Preț: 731.97 lei - 20%
Preț: 293.24 lei - 20%
Preț: 669.21 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 336.86 lei - 20%
Preț: 330.54 lei - 20%
Preț: 313.87 lei - 20%
Preț: 679.09 lei - 20%
Preț: 373.16 lei - 20%
Preț: 782.57 lei - 20%
Preț: 434.17 lei - 20%
Preț: 489.11 lei - 20%
Preț: 904.16 lei - 20%
Preț: 375.72 lei - 20%
Preț: 400.17 lei - 20%
Preț: 432.78 lei - 20%
Preț: 631.96 lei - 20%
Preț: 432.11 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 556.96 lei - 20%
Preț: 488.90 lei - 20%
Preț: 560.93 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 328.94 lei - 20%
Preț: 629.71 lei - 20%
Preț: 568.70 lei - 20%
Preț: 447.31 lei - 20%
Preț: 733.68 lei - 20%
Preț: 315.26 lei - 20%
Preț: 315.62 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 850.42 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 519.32 lei
Preț: 383.23 lei
Puncte Express: 575
Preț estimativ în valută:
67.79€ • 79.47$ • 58.98£
67.79€ • 79.47$ • 58.98£
Carte tipărită la comandă
Livrare economică 05-19 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540497677
ISBN-10: 3540497676
Pagini: 474
Ilustrații: XIV, 458 p.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.66 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540497676
Pagini: 474
Ilustrații: XIV, 458 p.
Dimensiuni: 155 x 235 x 32 mm
Greutate: 0.66 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talk.- Whither Cryptography?.- Symmetric Cryptography: Attacks.- Non-randomness in eSTREAM Candidates Salsa20 and TSC-4.- Differential and Rectangle Attacks on Reduced-Round SHACAL-1.- Algebraic Attacks on Clock-Controlled Cascade Ciphers.- An Algorithm for Solving the LPN Problem and Its Application to Security Evaluation of the HB Protocols for RFID Authentication.- Hash Functions.- Update on Tiger.- RC4-Hash: A New Hash Function Based on RC4.- Security of VSH in the Real World.- Provable Security: Key Agreement.- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols.- Efficient and Provably Secure Generic Construction of Three-Party Password-Based Authenticated Key Exchange Protocols.- On the Importance of Public-Key Validation in the MQV and HMQV Key Agreement Protocols.- Invited Talk.- Another Look at “Provable Security”. II.- Provable Security: Public Key Cryptography.- Efficient CCA-Secure Public-Key Encryption Schemes from RSA-Related Assumptions.- General Conversion for Obtaining Strongly Existentially Unforgeable Signatures.- Conditionally Verifiable Signature.- Constant Phase Bit Optimal Protocols for Perfectly Reliable and Secure Message Transmission.- Symmetric Cryptography: Design.- Using Wiedemann’s Algorithm to Compute the Immunity Against Algebraic and Fast Algebraic Attacks.- Enciphering with Arbitrary Small Finite Domains.- Enumeration of 9-Variable Rotation Symmetric Boolean Functions Having Nonlinearity > 240.- Modes of Operation and Message Authentication Codes.- Symmetric Nonce Respecting Security Model and the MEM Mode of Operation.- HCH: A New Tweakable Enciphering Scheme Using the Hash-Encrypt-Hash Approach.- Efficient Shared-Key Authentication Scheme from Any Weak Pseudorandom Function.- A Simple and Unified Methodof Proving Indistinguishability.- Fast Implementation of Public Key Cryptography.- Extended Double-Base Number System with Applications to Elliptic Curve Cryptography.- CMSS – An Improved Merkle Signature Scheme.- ID-Based Cryptography.- Constant-Size ID-Based Linkable and Revocable-iff-Linked Ring Signature.- Secure Cryptographic Workflow in the Standard Model.- Multi-receiver Identity-Based Key Encapsulation with Shortened Ciphertext.- Identity-Based Parallel Key-Insulated Encryption Without Random Oracles: Security Notions and Construction.- Embedded System and Side Channel Attacks.- AES Software Implementations on ARM7TDMI.- Galois LFSR, Embedded Devices and Side Channel Weaknesses.