David Chaum: Advances in Cryptology : Proceedings of Crypto 82 - Taschenbuch
2013, ISBN: 1475706049
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q)… Mehr…
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip. 348 pp. Englisch, Books<
[EAN: 9781475706048], Neubuch, [PU: Springer US Mrz 2013], This item is printed on demand - it takes 3-4 days longer - Neuware -Algorithms and Theory.- Fast Computation of Discrete Logari… Mehr…
[EAN: 9781475706048], Neubuch, [PU: Springer US Mrz 2013], This item is printed on demand - it takes 3-4 days longer - Neuware -Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip. 348 pp. Englisch, Books<
AbeBooks.de
BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
David Chaum: Advances in Cryptology : Proceedings of Crypto 82 - Taschenbuch
2013, ISBN: 1475706049
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q)… Mehr…
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip., Books<
David Chaum: Advances in Cryptology : Proceedings of Crypto 82 - Taschenbuch
2013, ISBN: 1475706049
[EAN: 9781475706048], Neubuch, [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Rem… Mehr…
[EAN: 9781475706048], Neubuch, [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip., Books<
Chaum, David (Herausgeber): Advances in Cryptology Proceedings of Crypto 82 - Taschenbuch
2013, ISBN: 1475706049
Softcover reprint of the original 1st ed. 1983 Kartoniert / Broschiert Physikalische Chemie, Kryptografie, Verschlüsselungstechnologie, mit Schutzumschlag 11, [PU:Springer US; Springer … Mehr…
Softcover reprint of the original 1st ed. 1983 Kartoniert / Broschiert Physikalische Chemie, Kryptografie, Verschlüsselungstechnologie, mit Schutzumschlag 11, [PU:Springer US; Springer US, New York, N.Y.]<
Achtung-Buecher.de
MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Details...
(*) Derzeit vergriffen bedeutet, dass dieser Titel momentan auf keiner der angeschlossenen Plattform verfügbar ist.
Advances in Cryptology : Proceedings of Crypto 82 - Taschenbuch
2013, ISBN: 1475706049
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q)… Mehr…
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip. 348 pp. Englisch, Books<
[EAN: 9781475706048], Neubuch, [PU: Springer US Mrz 2013], This item is printed on demand - it takes 3-4 days longer - Neuware -Algorithms and Theory.- Fast Computation of Discrete Logari… Mehr…
[EAN: 9781475706048], Neubuch, [PU: Springer US Mrz 2013], This item is printed on demand - it takes 3-4 days longer - Neuware -Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip. 348 pp. Englisch, Books<
NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)]
David Chaum: Advances in Cryptology : Proceedings of Crypto 82 - Taschenbuch
2013
ISBN: 1475706049
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q)… Mehr…
[EAN: 9781475706048], Neubuch, [SC: 0.0], [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip., Books<
David Chaum: Advances in Cryptology : Proceedings of Crypto 82 - Taschenbuch
2013, ISBN: 1475706049
[EAN: 9781475706048], Neubuch, [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Rem… Mehr…
[EAN: 9781475706048], Neubuch, [PU: Springer US], Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip., Books<
Chaum, David (Herausgeber): Advances in Cryptology Proceedings of Crypto 82 - Taschenbuch
2013, ISBN: 1475706049
Softcover reprint of the original 1st ed. 1983 Kartoniert / Broschiert Physikalische Chemie, Kryptografie, Verschlüsselungstechnologie, mit Schutzumschlag 11, [PU:Springer US; Springer … Mehr…
Softcover reprint of the original 1st ed. 1983 Kartoniert / Broschiert Physikalische Chemie, Kryptografie, Verschlüsselungstechnologie, mit Schutzumschlag 11, [PU:Springer US; Springer US, New York, N.Y.]<
Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) MARZIES.de Buch- und Medienhandel, 14621 Schönwalde-Glien
1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.
EAN (ISBN-13): 9781475706048 ISBN (ISBN-10): 1475706049 Taschenbuch Erscheinungsjahr: 2013 Herausgeber: Springer US
Buch in der Datenbank seit 2014-03-22T20:56:43+01:00 (Vienna) Detailseite zuletzt geändert am 2024-04-15T21:10:18+02:00 (Vienna) ISBN/EAN: 9781475706048
ISBN - alternative Schreibweisen: 1-4757-0604-9, 978-1-4757-0604-8 Alternative Schreibweisen und verwandte Suchbegriffe: Titel des Buches: crypto
Daten vom Verlag:
Autor/in: David Chaum Titel: Advances in Cryptology - Proceedings of Crypto 82 Verlag: Springer; Springer US 331 Seiten Erscheinungsjahr: 2013-03-06 New York; NY; US Gedruckt / Hergestellt in Niederlande. Sprache: Englisch 53,49 € (DE) 54,99 € (AT) 59,00 CHF (CH) POD XV, 331 p.
Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ‘Data Encryption Standard’ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breakingthe Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip.
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten: