Cantitate/Preț
Produs

Selected Areas in Cryptography

Editat de Douglas R. Stinson, Stafford Tavares
en Limba Engleză Paperback – 25 apr 2001

Preț: 32503 lei

Preț vechi: 40629 lei
-20%

Puncte Express: 488

Preț estimativ în valută:
5748 6591$ 4967£

Carte tipărită la comandă

Livrare economică 27 aprilie-11 mai


Specificații

ISBN-13: 9783540420699
ISBN-10: 354042069X
Pagini: 356
Ilustrații: IX, 347 p.
Dimensiuni: 155 x 235 x 20 mm
Greutate: 0.54 kg
Ediția:2001
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany

Public țintă

Research

Cuprins

Cryptanalysis I.- Analysis of IS-95 CDMA Voice Privacy.- Attacks on Additive Encryption of Redundant Plaintext and Implications on Internet Security.- Cryptanalysis of the “Augmented Family of Cryptographic Parity Circuits” Proposed at ISW’97.- Block Ciphers — New Designs.- Camellia: A 128-Bit Block Cipher Suitable for Multiple Platforms — Design andAnalysis.- DFCv2.- The Block Cipher Hierocrypt.- Symmetric Block Ciphers Based on Group Bases.- Elliptic Curves and Efficient Implementations.- Speeding up the Arithmetic on Koblitz Curves of Genus Two.- On Complexity of Polynomial Basis Squaring in F2m.- Security Protocols and Applications.- Dynamic Multi-threshold Metering Schemes.- Chained Stream Authentication.- A Global PMI for Electronic Content Distribution.- Block Ciphers and Hash Functions.- A Polynomial-Time Universal Security Amplifier in the Class of Block Ciphers.- Decorrelation over Infinite Domains: The Encrypted CBC-MAC Case.- HAS-V: A New Hash Function with Variable Output Length.- Boolean Functions and Stream Ciphers.- On Welch-Gong Transformation Sequence Generators.- Modes of Operation of Stream Ciphers.- LILI Keystream Generator.- Improved Upper Bound on the Nonlinearity of High Order Correlation Immune Functions.- Public Key Systems.- Towards Practical Non-interactive Public Key Cryptosystems Using Non-maximal Imaginary Quadratic Orders (Extended Abstract).- On the Implementation of Cryptosystems Based on Real Quadratic Number Fields (Extended Abstract).- Cryptanalysis II.- Root Finding Interpolation Attack.- Differential Cryptanalysis of Reduced Rounds of GOST.- Practical Security Evaluation against Differential and Linear Cryptanalyses for Feistel Ciphers with SPN Round Function.

Caracteristici

Includes supplementary material: sn.pub/extras