Topics in Cryptology -- CT-RSA 2004
Editat de Tatsuaki Okamotoen Limba Engleză Paperback – 10 feb 2004
Preț: 326.48 lei
Preț vechi: 408.10 lei
-20% Nou
Puncte Express: 490
Preț estimativ în valută:
57.76€ • 67.29$ • 50.44£
57.76€ • 67.29$ • 50.44£
Carte tipărită la comandă
Livrare economică 19 ianuarie-02 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540209966
ISBN-10: 3540209964
Pagini: 404
Ilustrații: XII, 392 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540209964
Pagini: 404
Ilustrații: XII, 392 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.61 kg
Ediția:2004
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Symmetric Encryption.- Online Encryption Schemes: New Security Notions and Constructions.- Related-Key Attacks on Triple-DES and DESX Variants.- Design of AES Based on Dual Cipher and Composite Field.- Periodic Properties of Counter Assisted Stream Ciphers.- A Fast Correlation Attack via Unequal Error Correcting LDPC Codes.- Aymmetric Encryption.- k-Resilient Identity-Based Encryption in the Standard Model.- A Generic Construction for Intrusion-Resilient Public-Key Encryption.- Digital Signatures.- A Certificate-Based Signature Scheme.- Identity Based Undeniable Signatures.- Compressing Rabin Signatures.- Protocols.- A Key Recovery System as Secure as Factoring.- Server Assisted Signatures Revisited.- Cryptanalysis of a Zero-Knowledge Identification Protocol of Eurocrypt ‘95.- Universal Re-encryption for Mixnets.- Bit String Commitment Reductions with a Non-zero Rate.- Improving Robustness of PGP Keyrings by Conflict Detection.- Side-Channel Attacks.- Issues of Security with the Oswald-Aigner Exponentiation Algorithm.- Hardware Countermeasures against DPA – A Statistical Analysis of Their Effectiveness.- Self-Randomized Exponentiation Algorithms.- Hardwares.- Flexible Hardware Design for RSA and Elliptic Curve Cryptosystems.- High-Speed Modular Multiplication.- Yet Another Sieving Device.- Mode of Operations.- A Parallelizable Enciphering Mode.- Padding Oracle Attacks on the ISO CBC Mode Encryption Standard.- Hash and Hash Chains.- A 1 Gbit/s Partially Unrolled Architecture of Hash Functions SHA-1 and SHA-512.- Fast Verification of Hash Chains.- Visual Cryptography.- Almost Ideal Contrast Visual Cryptography with Reversing.- Ellictic Curve Cryptosystems.- Weak Fields for ECC.
Caracteristici
Includes supplementary material: sn.pub/extras