ISBN: 9783540397991
A Conference on the Theory and Application of Cryptographic Techniques, Held at he University of California, Santa Barbara, through the Co-operation of the Computer Science Department, Au… Mehr…
hive.co.uk No. 9783540397991. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
ISBN: 9783540397991
Computer Science; Theory of Computation; Input/Output and Data Communications; Communications Engineering, Networks Computer, automata, calculus, computer science, cryptography, cryptolog… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
ISBN: 9783540397991
There is currently no description available Books > Computer Science eBook, Springer Shop
Springer.com new in stock. Versandkosten: EUR 0.00 Details... |
ISBN: 9783540397991
Advances in Cryptology ab 57.99 EURO Proceedings of CRYPTO '85 Medien > Bücher, [PU: Springer, Berlin/Heidelberg]
eBook.de Nr. Versandkosten:, , DE. (EUR 0.00) Details... |
Hugendubel.de Nr. Versandkosten:, , DE. (EUR 0.00) Details... |
ISBN: 9783540397991
A Conference on the Theory and Application of Cryptographic Techniques, Held at he University of California, Santa Barbara, through the Co-operation of the Computer Science Department, Au… Mehr…
ISBN: 9783540397991
Computer Science; Theory of Computation; Input/Output and Data Communications; Communications Engineering, Networks Computer, automata, calculus, computer science, cryptography, cryptolog… Mehr…
ISBN: 9783540397991
There is currently no description available Books > Computer Science eBook, Springer Shop
ISBN: 9783540397991
Advances in Cryptology ab 57.99 EURO Proceedings of CRYPTO '85 Medien > Bücher, [PU: Springer, Berlin/Heidelberg]
ISBN: 9783540397991
[PU: Springer, Berlin/Heidelberg]
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Advances in Cryptology
EAN (ISBN-13): 9783540397991
Herausgeber: Springer Science+Business Media
Buch in der Datenbank seit 2017-02-14T11:29:54+01:00 (Berlin)
Detailseite zuletzt geändert am 2021-09-06T09:52:48+02:00 (Berlin)
ISBN/EAN: 9783540397991
ISBN - alternative Schreibweisen:
978-3-540-39799-1
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: williams
Daten vom Verlag:
Autor/in: Hugh C. Williams
Titel: Lecture Notes in Computer Science; Advances in Cryptology - Proceedings of CRYPTO '85
Verlag: Springer; Springer Berlin
552 Seiten
Erscheinungsjahr: 2007-03-05
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XII, 552 p.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Theoretische Informatik; Verstehen; Computer; automata; calculus; computer science; cryptography; cryptology; information theory; C; Theory of Computation; Input/Output and Data Communications; Communications Engineering, Networks; Computer Science; Computerhardware; Nachrichtententechnik, Telekommunikation; BC
Signatures and authentication.- Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields.- Another Birthday Attack.- Attacks on Some RSA Signatures.- An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi.- A Secure Subliminal Channel (?).- Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences.- Protocols.- On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract).- A Secure Poker Protocol that Minimizes the Effect of Player Coalitions.- A Framework for the Study of Cryptographic Protocols.- Cheating at Mental Poker.- Security for the DoD Transmission Control Protocol.- Symmetric Public-Key Encryption.- Copy Protection.- Software Protection: Myth or Reality?.- Public Protection of Software.- Fingerprinting Long Forgiving Messages.- Single Key Cryptology.- Cryptanalysis of des with a Reduced Number of Rounds.- Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract).- A Layered Approach to the Design of Private Key Cryptosystems.- Lifetimes of Keys in Cryptographic Key Management Systems.- Correlation Immunity and the Summation Generator.- Design of Combiners to Prevent Divide and Conquer Attacks.- On the Security of DES.- Information theory without the finiteness assumption, II. Unfolding the DES.- Two Key Cryptology.- Analysis of a Public Key Approach Based on Polynomial Substitution.- Developing an RSA Chip.- An M3 Public-Key Encryption Scheme.- Trapdoor Rings And Their Use In Cryptography.- On Computing Logarithms Over Finite Fields.- N Using RSA with Low Exponent in a Public Key Network.- Lenstra’s Factorisation Method Based on Elliptic Curves.- Use of Elliptic Curves in Cryptography.- Randomness and Other Problems.- Cryptography withCellular Automata.- Efficient Parallel Pseudo-Random Number Generation.- How to Construct Pseudo-random Permutations from Pseudo-random Functions.- The Bit Security of Modular Squaring given Partial Factorization of the Modulos.- Some Cryptographic Aspects of Womcodes.- How to Reduce your Enemy’s Information (extended abstract).- Encrypting Problem Instances.- Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis.- Impromptu Talks.- A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes.- On the Design of S-Boxes.- The Real Reason for Rivest’s Phenomenon.- The Importance of “Good” Key Scheduling Schemes (How to Make a Secure DES* Scheme with ? 48 Bit Keys?).- Access Control at the Netherlands Postal and Telecommunications Services.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9780387164632 Advances in Cryptology: Proceedings of Crypto 85 (Lecture Notes in Computer Science) (Hugh C. Williams)
- 9780387164632 Advances in Cryptology: Proceedings of Crypto 85 (Lecture Notes in Computer Science) (Hugh C. Williams)
- 9783540164630 Advances in Cryptology: Proceedings of CRYPTO '85: 218 (Lecture Notes in Computer Science, 218) (Hugh C. Williams)
- 9780387156583 Advances in Cryptology: Proceedings of Crypto 84 (Lecture Notes in Computer Science) (Blakely, G. R.)
< zum Archiv...