- 5 Ergebnisse
Kleinster Preis: € 39,26, größter Preis: € 50,49, Mittelwert: € 44,36
1
Advances in Cryptology - CRYPTO '86 - Andrew M. Odlyzko
Bestellen
bei Springer.com
€ 39,26
Bestellengesponserter Link
Andrew M. Odlyzko:

Advances in Cryptology - CRYPTO '86 - neues Buch

ISBN: 9783540477211

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara.… Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
2
Advances in Cryptology - CRYPTO '86
Bestellen
bei Springer.com
€ 39,58
Versand: € 0,001
Bestellengesponserter Link

CRYPTO '86:

Advances in Cryptology - neues Buch

ISBN: 9783540477211

This book is the proceedings of CRYPTO 86, one in a series of annual conferences devoted to cryptologic research. They have all been held at the University of California at Santa Barbara.… Mehr…

Nr. 978-3-540-47721-1. Versandkosten:Worldwide free shipping, , DE. (EUR 0.00)
3
Advances in Cryptology - CRYPTO '86
Bestellen
bei Hugendubel.de
€ 50,49
Versand: € 0,001
Bestellengesponserter Link
Advances in Cryptology - CRYPTO '86 - neues Buch

ISBN: 9783540477211

Advances in Cryptology - CRYPTO '86 ab 50.49 € als pdf eBook: Proceedings. Aus dem Bereich: eBooks, Sachthemen & Ratgeber, Computer & Internet, Medien > Bücher, Advances in Cryptology - C… Mehr…

Nr. 33533036. Versandkosten:, , DE. (EUR 0.00)
4
Advances in Cryptology - CRYPTO '86 : Proceedings - Harold G. Callan
Bestellen
bei hive.co.uk
£ 36,55
(ca. € 41,99)
Bestellengesponserter Link
Harold G. Callan:
Advances in Cryptology - CRYPTO '86 : Proceedings - neues Buch

ISBN: 9783540477211

A Conference on the Theory and Application of Cryptographic Techniques Held at the University of California, Santa Barbara through the Co-operation of the Computer Science Department, Aug… Mehr…

  - No. 9783540477211. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
5
Advances in Cryptology - CRYPTO '86
Bestellen
bei eBook.de
€ 50,49
Versand: € 0,001
Bestellengesponserter Link
Advances in Cryptology - CRYPTO '86 - neues Buch

ISBN: 9783540477211

Advances in Cryptology - CRYPTO '86 - Proceedings: ab 50.49 € Medien > Bücher > E-books, [PU: Springer, Berlin/Heidelberg]

Nr. 33533036. Versandkosten:, , DE. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Advances in Cryptology - CRYPTO '86


EAN (ISBN-13): 9783540477211
Herausgeber: Springer Science+Business Media

Buch in der Datenbank seit 2017-01-07T10:27:22+01:00 (Berlin)
Detailseite zuletzt geändert am 2024-02-08T21:39:55+01:00 (Berlin)
ISBN/EAN: 9783540477211

ISBN - alternative Schreibweisen:
978-3-540-47721-1


Daten vom Verlag:

Autor/in: Andrew M. Odlyzko
Titel: Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO '86 - Proceedings
Verlag: Springer; Springer Berlin
490 Seiten
Erscheinungsjahr: 2003-05-16
Berlin; Heidelberg; DE
Sprache: Englisch
50,28 € (DE)
51,70 € (AT)
63,00 CHF (CH)
Available
XII, 490 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; DES; S-Box; Secret-Sharing; authentication; cryptographic protocol; cryptography; cryptology; cryptosystems; data encryption; encryption; privacy; secret sharing; C; Cryptology; Computer Science; Kryptografie, Verschlüsselungstechnologie; BC

Data Encryption Standard.- Structure in the S-Boxes of the DES (extended abstract).- Cycle Structure of the DES with Weak and Semi-Weak Keys.- Public-Key Cryptography.- Private-Key Algebraic-Coded Cryptosystems.- Some Variations on RSA Signatures & their Security.- Breaking the Cade Cipher.- A Modification of a Broken Public-Key Cipher.- A Pseudo-Random Bit Generator Based on Elliptic Logarithms.- Two Remarks Concerning the Goldwasser-Micali-Rivest Signature Scheme.- Public-key Systems Based on the Difficulty of Tampering (Is there a difference between DES and RSA?).- A Secure and Privacy-Protecting Protocol for Transmitting Personal Information Between Organizations.- Cryptographic Protocols And Zero-Knowledge Proofs.- How to Prove All NP Statements in Zero-Knowledge and a Methodology of Cryptographic Protocol Design (Extended Abstract).- How To Prove Yourself: Practical Solutions to Identification and Signature Problems.- Demonstrating that a Public Predicate can be Satisfied Without Revealing Any Information About How.- Demonstrating Possession of a Discrete Logarithm Without Revealing it.- Cryptographic Capsules: A Disjunctive Primitive for Interactive Protocols.- Zero-Knowledge Simulation of Boolean Circuits.- All-or-Nothing Disclosure of Secrets.- A zero-knowledge Poker protocol that achieves confidentiality of the players’ strategy or How to achieve an electronic Poker face.- Secret-Sharing Methods.- Secret Sharing Homomorphisms: Keeping Shares of a Secret Secret (Extended Abstract).- How to Share a Secret with Cheaters.- Smallest Possible Message Expansion in Threshold Schemes.- Hardware Systems.- VLSI implementation of public-key encryption algorithms.- Architectures for exponentiation in GF(2n).- Implementing the Rivest Shamir and Adleman Public KeyEncryption Algorithm on a Standard Digital Signal Processor.- Software Systems.- A High Speed Manipulation Detection Code.- Electronic Funds Transfer Point of Sale in Australia.- Software Protection, Probabilistic Methods, and Other Topics.- The Notion of Security for Probabilistic Cryptosystems (Extended Abstract).- Large-Scale Randomization Techniques.- On the Linear Span of Binary Sequences Obtained from Finite Geometries.- Some Constructions and Bounds for Authentication Codes.- Towards a Theory of Software Protection (Extended Abstract).- Informal Contributions.- Two Observations on Probabilistic Primality Testing.- Public Key Registration.- Is there an ultimate use of cryptography? (Extended Abstract).- Smart Card a Highly Reliable and Portable Security Device.- Thomas — A Complete Single Chip RSA Device.

< zum Archiv...