- 5 Ergebnisse
Kleinster Preis: € 44,02, größter Preis: € 57,99, Mittelwert: € 51,60
1
Advances in Cryptology : Proceedings of CRYPTO '85 - H.M. Piper
Bestellen
bei hive.co.uk
£ 42,49
(ca. € 48,28)
Bestellengesponserter Link
H.M. Piper:

Advances in Cryptology : Proceedings of CRYPTO '85 - neues Buch

ISBN: 9783540397991

A Conference on the Theory and Application of Cryptographic Techniques, Held at he University of California, Santa Barbara, through the Co-operation of the Computer Science Department, Au… Mehr…

  - No. 9783540397991. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten.
2
Advances in Cryptology - Hugh C. Williams
Bestellen
bei Springer.com
€ 44,02
Bestellengesponserter Link

Hugh C. Williams:

Advances in Cryptology - neues Buch

ISBN: 9783540397991

Computer Science; Theory of Computation; Input/Output and Data Communications; Communications Engineering, Networks Computer, automata, calculus, computer science, cryptography, cryptolog… Mehr…

  - Versandkosten:zzgl. Versandkosten.
3
Advances in Cryptology - Hugh C. Williams
Bestellen
bei Springer.com
$ 59,99
(ca. € 49,70)
Versand: € 0,001
Bestellengesponserter Link
Hugh C. Williams:
Advances in Cryptology - neues Buch

ISBN: 9783540397991

There is currently no description available Books > Computer Science eBook, Springer Shop

new in stock. Versandkosten: EUR 0.00
4
Bestellen
bei eBook.de
€ 57,99
Versand: € 0,001
Bestellengesponserter Link
Advances in Cryptology - neues Buch

ISBN: 9783540397991

Advances in Cryptology ab 57.99 EURO Proceedings of CRYPTO '85 Medien > Bücher, [PU: Springer, Berlin/Heidelberg]

  - Nr. Versandkosten:, , DE. (EUR 0.00)
5
Bestellen
bei Hugendubel.de
€ 57,99
Versand: € 0,001
Bestellengesponserter Link
Advances in Cryptology - neues Buch

ISBN: 9783540397991

[PU: Springer, Berlin/Heidelberg]

  - Nr. Versandkosten:, , DE. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch

Detailangaben zum Buch - Advances in Cryptology


EAN (ISBN-13): 9783540397991
Herausgeber: Springer Science+Business Media

Buch in der Datenbank seit 2017-02-14T11:29:54+01:00 (Berlin)
Detailseite zuletzt geändert am 2021-09-06T09:52:48+02:00 (Berlin)
ISBN/EAN: 9783540397991

ISBN - alternative Schreibweisen:
978-3-540-39799-1
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: williams


Daten vom Verlag:

Autor/in: Hugh C. Williams
Titel: Lecture Notes in Computer Science; Advances in Cryptology - Proceedings of CRYPTO '85
Verlag: Springer; Springer Berlin
552 Seiten
Erscheinungsjahr: 2007-03-05
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XII, 552 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Theoretische Informatik; Verstehen; Computer; automata; calculus; computer science; cryptography; cryptology; information theory; C; Theory of Computation; Input/Output and Data Communications; Communications Engineering, Networks; Computer Science; Computerhardware; Nachrichtententechnik, Telekommunikation; BC

Signatures and authentication.- Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields.- Another Birthday Attack.- Attacks on Some RSA Signatures.- An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi.- A Secure Subliminal Channel (?).- Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences.- Protocols.- On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract).- A Secure Poker Protocol that Minimizes the Effect of Player Coalitions.- A Framework for the Study of Cryptographic Protocols.- Cheating at Mental Poker.- Security for the DoD Transmission Control Protocol.- Symmetric Public-Key Encryption.- Copy Protection.- Software Protection: Myth or Reality?.- Public Protection of Software.- Fingerprinting Long Forgiving Messages.- Single Key Cryptology.- Cryptanalysis of des with a Reduced Number of Rounds.- Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract).- A Layered Approach to the Design of Private Key Cryptosystems.- Lifetimes of Keys in Cryptographic Key Management Systems.- Correlation Immunity and the Summation Generator.- Design of Combiners to Prevent Divide and Conquer Attacks.- On the Security of DES.- Information theory without the finiteness assumption, II. Unfolding the DES.- Two Key Cryptology.- Analysis of a Public Key Approach Based on Polynomial Substitution.- Developing an RSA Chip.- An M3 Public-Key Encryption Scheme.- Trapdoor Rings And Their Use In Cryptography.- On Computing Logarithms Over Finite Fields.- N Using RSA with Low Exponent in a Public Key Network.- Lenstra’s Factorisation Method Based on Elliptic Curves.- Use of Elliptic Curves in Cryptography.- Randomness and Other Problems.- Cryptography withCellular Automata.- Efficient Parallel Pseudo-Random Number Generation.- How to Construct Pseudo-random Permutations from Pseudo-random Functions.- The Bit Security of Modular Squaring given Partial Factorization of the Modulos.- Some Cryptographic Aspects of Womcodes.- How to Reduce your Enemy’s Information (extended abstract).- Encrypting Problem Instances.- Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis.- Impromptu Talks.- A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes.- On the Design of S-Boxes.- The Real Reason for Rivest’s Phenomenon.- The Importance of “Good” Key Scheduling Schemes (How to Make a Secure DES* Scheme with ? 48 Bit Keys?).- Access Control at the Netherlands Postal and Telecommunications Services.

< zum Archiv...