Selected Areas in Cryptography
Editat de Stafford Tavares, Henk Meijeren Limba Engleză Paperback – 14 apr 1999
Preț: 326.07 lei
Preț vechi: 407.59 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.69€ • 67.31$ • 50.44£
57.69€ • 67.31$ • 50.44£
Carte tipărită la comandă
Livrare economică 16-30 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540658948
ISBN-10: 3540658947
Pagini: 396
Ilustrații: X, 386 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:1999
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540658947
Pagini: 396
Ilustrații: X, 386 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:1999
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Design of Secret Key Cryptosystems.- Feistel Ciphers with L 2-Decorrelation.- Key-Dependent S-Box Manipulations.- On the Twofish Key Schedule.- Towards Provable Security of Substitution-Permutation Encryption Networks.- Randomness and Computational Issues.- An Accurate Evaluation of Maurer’s Universal Test.- Computational Alternatives to Random Number Generators.- Storage-Efficient Finite Field Basis Conversion.- Verifiable Partial Sharing of Integer Factors.- Analysis of Secret Key Cryptosystems.- Higher Order Differential Attack Using Chosen Higher Order Differences.- On Maximum Non-averaged Differential Probability.- Cryptanalysis of RC4-like Ciphers.- Cryptographic Systems.- Key Preassigned Traceability Schemes for Broadcast Encryption.- Mix-Based Electronic Payments.- Over the Air Service Provisioning.- Public Key Cryptosystems.- Faster Attacks on Elliptic Curve Cryptosystems.- Improved Algorithms for Elliptic Curve Arithmetic in GF(2n).- Cryptanalysis of a Fast Public Key Cryptosystem Presented at SAC ’97.- A Lattice- Based Public-Key Cryptosystem.- Design and Implementation of Secret Key Cryptosystems.- Fast DES Implementations for FPGAs and Its Application to a Universal Key-Search Machine.- IDEA: A Cipher for Multimedia Architectures?.- A Strategy for Constructing Fast Round Functions with Practical Security Against Differential and Linear Cryptanalysis.- The Nonhomomorphicity of Boolean Functions.- Attacks on Secret Key Cryptosystems.- Cryptanalysis of ORYX.- A Timing Attack on RC5.- Cryptanalysis of SPEED.- Invited Talks.- Authenticated Diffe-Hellman Key Agreement Protocols.- Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR.
Caracteristici
Includes supplementary material: sn.pub/extras