Theory of Cryptography
Editat de Moni Naoren Limba Engleză Paperback – 3 feb 2004
Preț: 634.39 lei
Preț vechi: 792.98 lei
-20% Nou
Puncte Express: 952
Preț estimativ în valută:
112.24€ • 130.76$ • 98.01£
112.24€ • 130.76$ • 98.01£
Carte tipărită la comandă
Livrare economică 17-31 ianuarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540210009
ISBN-10: 3540210008
Pagini: 544
Ilustrații: XII, 532 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.81 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540210008
Pagini: 544
Ilustrații: XII, 532 p.
Dimensiuni: 155 x 235 x 30 mm
Greutate: 0.81 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Notions of Reducibility between Cryptographic Primitives.- Indifferentiability, Impossibility Results on Reductions, and Applications to the Random Oracle Methodology.- On the Random-Oracle Methodology as Applied to Length-Restricted Signature Schemes.- Universally Composable Commitments Using Random Oracles.- Transformation of Digital Signature Schemes into Designated Confirmer Signature Schemes.- List-Decoding of Linear Functions and Analysis of a Two-Round Zero-Knowledge Argument.- On the Possibility of One-Message Weak Zero-Knowledge.- Soundness of Formal Encryption in the Presence of Active Adversaries.- Rerandomizable and Replayable Adaptive Chosen Ciphertext Attack Secure Cryptosystems.- Alternatives to Non-malleability: Definitions, Constructions, and Applications.- A Note on Constant-Round Zero-Knowledge Proofs for NP.- Lower Bounds for Concurrent Self Composition.- Secret-Key Zero-Knowlegde and Non-interactive Verifiable Exponentiation.- A Quantitative Approach to Reductions in Secure Computation.- Algorithmic Tamper-Proof (ATP) Security: Theoretical Foundations for Security against Hardware Tampering.- Physically Observable Cryptography.- Efficient and Universally Composable Committed Oblivious Transfer and Applications.- A Universally Composable Mix-Net.- A General Composition Theorem for Secure Reactive Systems.- Unfair Noisy Channels and Oblivious Transfer.- Computational Collapse of Quantum State with Application to Oblivious Transfer.- Implementing Oblivious Transfer Using Collection of Dense Trapdoor Permutations.- Composition of Random Systems: When Two Weak Make One Strong.- Simpler Session-Key Generation from Short Random Passwords.- Constant-Round Oblivious Transfer in the Bounded Storage Model.- Hierarchical Threshold Secret Sharing.- On Compressing Encrypted Data without the Encryption Key.- On the Notion of Pseudo-Free Groups.