Kategorien
Konto
Anmelden / Registrieren
Warenkorb
 
 

Selected Areas in Cryptography


Menge:  Stück  
Produktinformationen
cover
cover
Artikel-Nr.:
     858A-9783540006220
Hersteller:
     Springer Verlag
Herst.-Nr.:
     9783540006220
EAN/GTIN:
     9783540006220
Suchbegriffe:
Allgemeine Informatikbücher
Bücher für Datenbanken - englischsp...
Datenbanken (Fachbücher)
Datenbankenbücher
Elliptic Curve Enhancements.- Modifications of ECDSA.- Integer Decomposition for Fast Scalar Multiplication on Elliptic Curves.- Analysis of the Gallant-Lambert-Vanstone Method Based on Efficient Endomorphisms: Elliptic and Hyperelliptic Curves.- SNOW.- Guess-and-Determine Attacks on SNOW.- A New Version of the Stream Cipher SNOW.- Encryption Schemes.- Encryption-Scheme Security in the Presence of Key-Dependent Messages.- On the Security of CTR + CBC-MAC.- Single-Path Authenticated-Encryption Scheme Based on Universal Hashing.- Differential Attacks.- Markov Truncated Differential Cryptanalysis of Skipjack.- Higher Order Differential Attack of Camellia(II).- Square-like Attacks on Reduced Rounds of IDEA.- Full-Round Differential Attack on the Original Version of the Hash Function Proposed at PKC'98.- Boolean Functions and Stream Ciphers.- On Propagation Characteristics of Resilient Functions.- Two Alerts for Design of Certain Stream Ciphers: Trapped LFSR and Weak Resilient Function over GF(q).- Multiples of Primitive Polynomials and Their Products over GF(2).- A New Cryptanalytic Attack for PN-generators Filtered by a Boolean Function.- Block Cipher Security.- White-Box Cryptography and an AES Implementation.- Luby-Racko. Ciphers: Why XOR Is Not So Exclusive.- Signatures and Secret Sharing.- New Results on Unconditionally Secure Distributed Oblivious Transfer.- Efficient Identity Based Signature Schemes Based on Pairings.- The Group Diffie-Hellman Problems.- MAC and Hash Constructions.- Secure Block Ciphers Are Not Sufficient for One-Way Hash Functions in the Preneel-Govaerts-Vandewalle Model.- An Efficient MAC for Short Messages.- RSA and XTR Enhancements.- Optimal Extension Fields for XTR.- On Some Attacks on Multi-prime RSA.
Weitere Informationen:
Author:
Kaisa Nyberg; Howard Heys
Verlag:
Springer Berlin
Sprache:
eng
Weitere Suchbegriffe: allgemeine Informatikbücher - englischsprachig, allgemeine informatikbücher - englischsprachig, Kryptografie, Verschlüsselung, Boolean function, RSA, RSA cryptosystems, cryptanalysis, cryptographic protocols, cryptography, cryptology, data encryption, data security
Die Konditionen im Überblick1
Lieferzeit
Lagerstand
Preis
€ 49,99*
Konditionen selbst auswählen
Artikel empfehlenArtikel merken
* Preise mit Sternchen sind Nettopreise zzgl. gesetzlich gültiger MwSt.
UVP bedeutet „Unverbindliche Preisempfehlung“
Unser Angebot richtet sich ausschließlich an Unternehmen, Gewerbetreibende und Freiberufler.