Public Key Cryptography - PKC 2006: 9th International Conference on Theory and Practice in Public-Key Cryptography, New York, NY, USA, April 24-26, 2006. Proceedings: Lecture Notes in Computer Science, cartea 3958
Editat de Moti Yung, Yevgeniy Dodis, Aggelos Kiayias, Tal Malkinen Limba Engleză Paperback – 18 apr 2006
Din seria Lecture Notes in Computer Science
- 20%
Preț: 400.77 lei - 20%
Preț: 754.11 lei - 20%
Preț: 324.19 lei - 20%
Preț: 373.80 lei - 20%
Preț: 342.61 lei - 20%
Preț: 403.00 lei - 20%
Preț: 573.45 lei -
Preț: 395.25 lei - 20%
Preț: 487.46 lei - 20%
Preț: 355.27 lei - 20%
Preț: 731.97 lei - 20%
Preț: 293.24 lei - 20%
Preț: 669.21 lei - 20%
Preț: 984.64 lei - 20%
Preț: 620.33 lei - 20%
Preț: 336.86 lei - 20%
Preț: 330.54 lei - 20%
Preț: 313.87 lei - 20%
Preț: 679.09 lei - 20%
Preț: 373.16 lei - 20%
Preț: 782.57 lei - 20%
Preț: 434.17 lei - 20%
Preț: 489.11 lei - 20%
Preț: 904.16 lei - 20%
Preț: 375.72 lei - 20%
Preț: 400.17 lei - 20%
Preț: 432.78 lei - 20%
Preț: 631.96 lei - 20%
Preț: 432.11 lei - 20%
Preț: 1359.66 lei - 20%
Preț: 556.96 lei - 20%
Preț: 488.90 lei - 20%
Preț: 560.93 lei - 20%
Preț: 327.36 lei - 20%
Preț: 340.04 lei - 20%
Preț: 327.36 lei - 20%
Preț: 328.94 lei - 20%
Preț: 629.71 lei - 20%
Preț: 568.70 lei - 20%
Preț: 447.31 lei - 20%
Preț: 733.68 lei - 20%
Preț: 315.26 lei - 20%
Preț: 315.62 lei - 20%
Preț: 1020.28 lei - 20%
Preț: 850.42 lei - 20%
Preț: 1391.87 lei - 20%
Preț: 519.32 lei
Preț: 388.20 lei
Puncte Express: 582
Preț estimativ în valută:
68.71€ • 80.11$ • 59.53£
68.71€ • 80.11$ • 59.53£
Carte tipărită la comandă
Livrare economică 27 februarie-13 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540338512
ISBN-10: 3540338519
Pagini: 564
Ilustrații: XIV, 543 p.
Dimensiuni: 155 x 235 x 37 mm
Greutate: 0.78 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540338519
Pagini: 564
Ilustrații: XIV, 543 p.
Dimensiuni: 155 x 235 x 37 mm
Greutate: 0.78 kg
Ediția:2006
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seria Lecture Notes in Computer Science
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Cryptanalysis and Protocol Weaknesses.- New Attacks on RSA with Small Secret CRT-Exponents.- An Attack on a Modified Niederreiter Encryption Scheme.- Cryptanalysis of an Efficient Proof of Knowledge of Discrete Logarithm.- Distributed Crypto-computing.- Efficient Polynomial Operations in the Shared-Coefficients Setting.- Generic On-Line/Off-Line Threshold Signatures.- Linear Integer Secret Sharing and Distributed Exponentiation.- Encryption Methods.- Encoding-Free ElGamal Encryption Without Random Oracles.- Parallel Key-Insulated Public Key Encryption.- Provably Secure Steganography with Imperfect Sampling.- Cryptographic Hash and Applications.- Collision-Resistant No More: Hash-and-Sign Paradigm Revisited.- Higher Order Universal One-Way Hash Functions from the Subset Sum Assumption.- Number Theory Algorithms.- An Algorithm to Solve the Discrete Logarithm Problem with the Number Field Sieve.- Efficient Scalar Multiplication by Isogeny Decompositions.- Curve25519: New Diffie-Hellman Speed Records.- Pairing-Based Cryptography.- Strongly Unforgeable Signatures Based on Computational Diffie-Hellman.- Generalization of the Selective-ID Security Model for HIBE Protocols.- Identity-Based Aggregate Signatures.- On the Limitations of the Spread of an IBE-to-PKE Transformation.- Cryptosystems Design and Analysis.- Inoculating Multivariate Schemes Against Differential Attacks.- Random Subgroups of Braid Groups: An Approach to Cryptanalysis of a Braid Group Based Cryptographic Protocol.- High-Order Attacks Against the Exponent Splitting Protection.- Signature and Identification.- New Online/Offline Signature Schemes Without Random Oracles.- Anonymous Signature Schemes.- The Power of Identification Schemes.- Authentication and Key Establishment.- Security Analysis of KEA Authenticated Key Exchange Protocol.- SAS-Based Authenticated Key Agreement.- The Twist-AUgmented Technique for Key Exchange.- Password-Based Group Key Exchange in a Constant Number of Rounds.- Multi-party Computation.- Conditional Oblivious Cast.- Efficiency Tradeoffs for Malicious Two-Party Computation.- PKI Techniques.- On Constructing Certificateless Cryptosystems from Identity Based Encryption.- Building Better Signcryption Schemes with Tag-KEMs.- Security-Mediated Certificateless Cryptography.- k-Times Anonymous Authentication with a Constant Proving Cost.