Cantitate/Preț
Produs

Selected Areas in Cryptography

Editat de Kaisa Nyberg, Howard Heys
en Limba Engleză Paperback – 25 feb 2003

Preț: 32749 lei

Preț vechi: 40937 lei
-20% Nou

Puncte Express: 491

Preț estimativ în valută:
5794 6750$ 5060£

Carte tipărită la comandă

Livrare economică 17-31 ianuarie 26

Preluare comenzi: 021 569.72.76

Specificații

ISBN-13: 9783540006220
ISBN-10: 3540006222
Pagini: 424
Ilustrații: XII, 412 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.64 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Elliptic Curve Enhancements.- Modifications of ECDSA.- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves.- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.- SNOW.- Guess-and-Determine Attacks on SNOW.- A New Version of the Stream Cipher SNOW.- Encryption Schemes.- Encryption-Scheme Security in the Presence of Key-Dependent Messages.- On the Security of CTR + CBC-MAC.- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.- Differential Attacks.- Markov Truncated Differential Cryptanalysis of Skipjack.- Higher Order Differential Attack of Camellia(II).- Square-like Attacks on Reduced Rounds of IDEA.- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98.- Boolean Functions and Stream Ciphers.- On Propagation Characteristics of Resilient Functions.- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).- Multiples of Primitive Polynomials and Their Products over GF(2).- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function.- Block Cipher Security.- White-Box Cryptography and an AES Implementation.- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive.- Signatures and Secret Sharing.- New Results on Unconditionally Secure Distributed Oblivious Transfer.- Efficient Identity Based Signature Schemes Based on Pairings.- The Group Diffie-Hellman Problems.- MAC and Hash Constructions.- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.- An Efficient MAC for Short Messages.- RSA and XTR Enhancements.- Optimal Extension Fields for XTR.- On Some Attacks on Multi-prime RSA.

Caracteristici

Includes supplementary material: sn.pub/extras