Selected Areas in Cryptography
Editat de Helena Handschuh, Anwar Hasanen Limba Engleză Paperback – 31 ian 2005
Preț: 324.85 lei
Preț vechi: 406.06 lei
-20% Nou
Puncte Express: 487
Preț estimativ în valută:
57.47€ • 67.06$ • 50.25£
57.47€ • 67.06$ • 50.25£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540243274
ISBN-10: 3540243275
Pagini: 372
Ilustrații: XI, 358 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.56 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540243275
Pagini: 372
Ilustrații: XI, 358 p.
Dimensiuni: 155 x 235 x 21 mm
Greutate: 0.56 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Stream Cipher Cryptanalysis.- An Improved Correlation Attack on A5/1.- Extending the Resynchronization Attack.- A New Simple Technique to Attack Filter Generators and Related Ciphers.- Side-Channel Analysis.- On XTR and Side-Channel Analysis.- Provably Secure Masking of AES.- Block Cipher Design.- Perfect Diffusion Primitives for Block Ciphers.- Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results.- FOX : A New Family of Block Ciphers.- Efficient Implementations.- A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue.- Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity.- Modular Number Systems: Beyond the Mersenne Family.- Efficient Doubling on Genus Two Curves over Binary Fields.- Secret Key Cryptography I.- About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations).- A Subliminal Channel in Secret Block Ciphers.- Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes.- Cryptanalysis.- Cryptanalysis of a White Box AES Implementation.- Predicting Subset Sum Pseudorandom Generators.- Collision Attack and Pseudorandomness of Reduced-Round Camellia.- Cryptographic Protocols.- Password Based Key Exchange with Mutual Authentication.- Product Construction of Key Distribution Schemes for Sensor Networks.- Deterministic Key Predistribution Schemes for Distributed Sensor Networks.- On Proactive Secret Sharing Schemes.- Secret Key Cryptography II.- Efficient Constructions of Variable-Input-Length Block Ciphers.- A Sufficient Condition for Optimal Domain Extension of UOWHFs.