Topics in Cryptology -- CT-RSA 2005
Editat de Alfred John Menezesen Limba Engleză Paperback – 24 ian 2005
Preț: 326.27 lei
Preț vechi: 407.84 lei
-20% Nou
Puncte Express: 489
Preț estimativ în valută:
57.73€ • 67.25$ • 50.41£
57.73€ • 67.25$ • 50.41£
Carte tipărită la comandă
Livrare economică 19 ianuarie-02 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783540243991
ISBN-10: 3540243992
Pagini: 400
Ilustrații: X, 390 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3540243992
Pagini: 400
Ilustrații: X, 390 p.
Dimensiuni: 155 x 235 x 22 mm
Greutate: 0.6 kg
Ediția:2005
Editura: Springer
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
ResearchCuprins
Invited Talks.- Sub-linear Queries Statistical Databases: Privacy with Power.- Malicious Cryptography: Kleptographic Aspects.- Cryptanalysis.- Resistance of SNOW 2.0 Against Algebraic Attacks.- A Study of the Security of Unbalanced Oil and Vinegar Signature Schemes.- Hold Your Sessions: An Attack on Java Session-Id Generation.- Update on SHA-1.- A Fast Correlation Attack on the Shrinking Generator.- Public-Key Encryption.- Improved Efficiency for CCA-Secure Cryptosystems Built Using Identity-Based Encryption.- A Generic Conversion with Optimal Redundancy.- Choosing Parameter Sets for NTRUEncrypt with NAEP and SVES-3.- Signature Schemes.- Foundations of Group Signatures: The Case of Dynamic Groups.- Time-Selective Convertible Undeniable Signatures.- Design Principles.- On Tolerant Cryptographic Constructions.- Password-Based Protocols.- Simple Password-Based Encrypted Key Exchange Protocols.- Hard Bits of the Discrete Log with Applications to Password Authentication.- Proofs for Two-Server Password Authentication.- Design and Analysis of Password-Based Key Derivation Functions.- Pairings.- A New Two-Party Identity-Based Authenticated Key Agreement.- Accumulators from Bilinear Pairings and Applications.- Computing the Tate Pairing.- Fast and Proven Secure Blind Identity-Based Signcryption from Pairings.- Efficient and Secure Implementation.- A Systematic Evaluation of Compact Hardware Implementations for the Rijndael S-Box.- CryptoGraphics: Secret Key Cryptography Using Graphics Cards.- Side-Channel Leakage of Masked CMOS Gates.- New Minimal Weight Representations for Left-to-Right Window Methods.
Caracteristici
Includes supplementary material: sn.pub/extras