Selected Areas in Cryptography
Editat de Kaisa Nyberg, Howard Heysen Limba Engleză Paperback – 25 feb 2003
Preț: 327.49 lei
Preț vechi: 409.37 lei
-20% Nou
Puncte Express: 491
Preț estimativ în valută:
57.94€ • 67.50$ • 50.60£
57.94€ • 67.50$ • 50.60£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540006220
ISBN-10: 3540006222
Pagini: 424
Ilustrații: XII, 412 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.64 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540006222
Pagini: 424
Ilustrații: XII, 412 p.
Dimensiuni: 155 x 235 x 23 mm
Greutate: 0.64 kg
Ediția:2003
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Elliptic Curve Enhancements.- Modifications of ECDSA.- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves.- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.- SNOW.- Guess-and-Determine Attacks on SNOW.- A New Version of the Stream Cipher SNOW.- Encryption Schemes.- Encryption-Scheme Security in the Presence of Key-Dependent Messages.- On the Security of CTR + CBC-MAC.- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.- Differential Attacks.- Markov Truncated Differential Cryptanalysis of Skipjack.- Higher Order Differential Attack of Camellia(II).- Square-like Attacks on Reduced Rounds of IDEA.- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC’98.- Boolean Functions and Stream Ciphers.- On Propagation Characteristics of Resilient Functions.- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).- Multiples of Primitive Polynomials and Their Products over GF(2).- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function.- Block Cipher Security.- White-Box Cryptography and an AES Implementation.- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive.- Signatures and Secret Sharing.- New Results on Unconditionally Secure Distributed Oblivious Transfer.- Efficient Identity Based Signature Schemes Based on Pairings.- The Group Diffie-Hellman Problems.- MAC and Hash Constructions.- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.- An Efficient MAC for Short Messages.- RSA and XTR Enhancements.- Optimal Extension Fields for XTR.- On Some Attacks on Multi-prime RSA.
Caracteristici
Includes supplementary material: sn.pub/extras