Topics in Cryptology -- CT-RSA 2014: Security and Cryptology
Editat de Josh Benalohen Limba Engleză Paperback – 4 feb 2014
Din seria Security and Cryptology
- 20%
Preț: 327.36 lei - 20%
Preț: 325.30 lei - 20%
Preț: 330.54 lei - 20%
Preț: 524.32 lei - 20%
Preț: 329.74 lei - 20%
Preț: 495.22 lei - 15%
Preț: 499.72 lei -
Preț: 383.23 lei -
Preț: 376.75 lei - 20%
Preț: 323.41 lei -
Preț: 385.06 lei - 15%
Preț: 672.87 lei - 20%
Preț: 317.85 lei - 20%
Preț: 390.12 lei - 20%
Preț: 317.85 lei - 20%
Preț: 497.84 lei - 20%
Preț: 327.36 lei - 20%
Preț: 321.03 lei - 15%
Preț: 497.51 lei -
Preț: 379.15 lei -
Preț: 374.34 lei - 20%
Preț: 326.55 lei - 20%
Preț: 321.81 lei -
Preț: 368.43 lei - 20%
Preț: 319.42 lei -
Preț: 372.15 lei - 20%
Preț: 321.81 lei -
Preț: 380.46 lei - 20%
Preț: 319.75 lei -
Preț: 376.75 lei -
Preț: 371.00 lei -
Preț: 377.68 lei - 20%
Preț: 390.46 lei -
Preț: 379.51 lei - 20%
Preț: 250.79 lei - 20%
Preț: 493.97 lei -
Preț: 395.25 lei - 20%
Preț: 461.90 lei - 20%
Preț: 323.41 lei - 20%
Preț: 329.74 lei - 20%
Preț: 320.55 lei -
Preț: 381.55 lei - 20%
Preț: 647.15 lei -
Preț: 432.39 lei -
Preț: 376.75 lei -
Preț: 373.40 lei - 20%
Preț: 329.60 lei - 20%
Preț: 642.40 lei -
Preț: 374.91 lei -
Preț: 376.75 lei
Preț: 332.21 lei
Preț vechi: 415.26 lei
-20% Nou
Puncte Express: 498
Preț estimativ în valută:
58.78€ • 68.48$ • 51.33£
58.78€ • 68.48$ • 51.33£
Carte tipărită la comandă
Livrare economică 19 ianuarie-02 februarie 26
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783319048512
ISBN-10: 3319048511
Pagini: 516
Ilustrații: XI, 501 p. 76 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.77 kg
Ediția:2014
Editura: Springer
Seria Security and Cryptology
Locul publicării:Cham, Switzerland
ISBN-10: 3319048511
Pagini: 516
Ilustrații: XI, 501 p. 76 illus.
Dimensiuni: 155 x 235 x 28 mm
Greutate: 0.77 kg
Ediția:2014
Editura: Springer
Seria Security and Cryptology
Locul publicării:Cham, Switzerland
Public țintă
ResearchCuprins
Efficient and Secure Algorithms for GLV-Based Scalar Multiplication and Their Implementation on GLV-GLS Curves.- An Improved Compression Technique for Signatures Based on Learning with Errors.- A Generic View on Trace-and-Revoke Broadcast Encryption Schemes.- Practical Dual-Receiver Encryption: Soundness, Complete Non-malleability, and Applications.- Attacking PUF-Based Pattern Matching Key Generators via Helper Data Manipulation.- On Increasing the Throughput of Stream Ciphers.- On Double Exponentiation for Securing RSA against Fault Analysis.- Side-Channel Attacks.- On the Practical Security of a Leakage Resilient Masking Scheme.- The Myth of Generic DPA... and the Magic of Learning.- Hardware Implementation and Side-Channel Analysis of Lapin.- Automatic Search for Differential Trails in ARX Ciphers.- CBEAM: Efficient Authenticated Encryption from Feebly One-Way φ Functions.- Beyond Modes: Building a Secure Record Protocol from a Cryptographic Sponge Permutation.- Group Signatures with Message-Dependent Opening in the Standard Model.- Practical Distributed Signatures in the Standard Model.- Decentralized Traceable Attribute-Based Signatures.- Rethinking Verifiably Encrypted Signatures: A Gap in Functionality and Potential Solutions.- P2OFE: Privacy-Preserving Optimistic Fair Exchange of Digital Signatures.- 2-Pass Key Exchange Protocols from CPA-Secure KEM.- Analysis of BLAKE2.- An Automated Evaluation Tool for Improved Rebound Attack: New Distinguishers and Proposals of ShiftBytes Parameters for Grφstl.- Practical Collision Attack on 40-Step RIPEMD-128.- KDM Security in the Hybrid Framework.- Key Wrapping with a Fixed Permutation.