2010, ISBN: 9783642146237
Computer Science; Cryptology; Management of Computing and Information Systems; Computer Communication Networks; Systems and Data Security; Computers and Society; Discrete Mathematics in C… Mehr…
Springer.com Versandkosten:zzgl. Versandkosten. Details... |
2010, ISBN: 9783642146237
30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings eBook… Mehr…
Orellfuessli.ch No. 44260120. Versandkosten:Zzgl. Versandkosten. (EUR 15.77) Details... |
Advances in Cryptology -- CRYPTO 2010 : 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings - neues Buch
2010, ISBN: 9783642146237
; PDF; Reference > Research & information: general > Coding theory & cryptology, Springer Berlin Heidelberg
hive.co.uk No. 9783642146237. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
Advances in Cryptology -- CRYPTO 2010 : 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings - neues Buch
2010, ISBN: 9783642146237
; PDF; Computing > Computer security > Data encryption, Steinkopff
hive.co.uk No. 9783642146237. Versandkosten:Instock, Despatched same working day before 3pm, zzgl. Versandkosten. Details... |
2010, ISBN: 9783642146237
Advances in Cryptology -- CRYPTO 2010 ab 87.99 EURO 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings Medien > Bücher, [PU: Springer, Berlin/Heide… Mehr…
eBook.de Nr. Versandkosten:, , DE. (EUR 0.00) Details... |
2010, ISBN: 9783642146237
Computer Science; Cryptology; Management of Computing and Information Systems; Computer Communication Networks; Systems and Data Security; Computers and Society; Discrete Mathematics in C… Mehr…
2010, ISBN: 9783642146237
30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings eBook… Mehr…
2010, ISBN: 9783642146237
Advances in Cryptology -- CRYPTO 2010 ab 87.99 EURO 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings Medien > Bücher, [PU: Springer, Berlin/Heide… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Advances in Cryptology -- CRYPTO 2010
EAN (ISBN-13): 9783642146237
Erscheinungsjahr: 2010
Herausgeber: Springer Science+Business Media
Buch in der Datenbank seit 2017-08-20T00:08:37+02:00 (Vienna)
Detailseite zuletzt geändert am 2023-08-05T19:10:52+02:00 (Vienna)
ISBN/EAN: 9783642146237
ISBN - alternative Schreibweisen:
978-3-642-14623-7
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: tal, kissling
Titel des Buches: barbara, august santa
Daten vom Verlag:
Autor/in: Tal Rabin
Titel: Security and Cryptology; Lecture Notes in Computer Science; Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Verlag: Springer; Springer Berlin
744 Seiten
Erscheinungsjahr: 2010-08-11
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
55,00 € (AT)
59,00 CHF (CH)
Available
XIV, 744 p. 63 illus.
EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; AES; Hashing; Internet; Permutation; algebraic geometry; authentication; block ciphers; collision resistance; complexity; cryptography; embedded systems; security; trust; C; Cryptology; IT Operations; Computer Communication Networks; Data and Information Security; Computers and Society; Discrete Mathematics in Computer Science; Computer Science; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Mathematik für Informatiker; Diskrete Mathematik; BC
Leakage.- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability.- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.- Protecting Cryptographic Keys against Continual Leakage.- Securing Computation against Continuous Leakage.- Lattice.- An Efficient and Parallel Gaussian Sampler for Lattices.- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.- Homomorphic Encryption.- Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.- Additively Homomorphic Encryption with d-Operand Multiplications.- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.- Theory and Applications.- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.- Structure-Preserving Signatures and Commitments to Group Elements.- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.- Key Exchange, OAEP/RSA, CCA.- Credential Authenticated Identification and Key Exchange.- Password-Authenticated Session-Key Generation on the Internet in the Plain Model.- Instantiability of RSA-OAEP under Chosen-Plaintext Attack.- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.- Attacks.- Factorization of a 768-Bit RSA Modulus.- Correcting Errors in RSA Private Keys.- Improved Differential Attacks for ECHO and Grøstl.- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.- Composition.- Universally Composable Incoercibility.- Concurrent Non-Malleable Zero Knowledge Proofs.- Equivalence of Uniform Key Agreement and Composition Insecurity.- Computation Delegation and Obfuscation.- Non-interactive Verifiable Computing:Outsourcing Computation to Untrusted Workers.- Improved Delegation of Computation Using Fully Homomorphic Encryption.- Oblivious RAM Revisited.- On Strong Simulation and Composable Point Obfuscation.- Multiparty Computation.- Protocols for Multiparty Coin Toss with Dishonest Majority.- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.- Secure Multiparty Computation with Minimal Interaction.- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.- Pseudorandomness.- On Generalized Feistel Networks.- Cryptographic Extraction and Key Derivation: The HKDF Scheme.- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.- Quantum.- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.- Sampling in a Quantum Population, and Applications.Up-to-date research in cryptology
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783642320095 Advances in Cryptology -- CRYPTO 2012 (Ran Canetti; Reihaneh Safavi-Naini)
- 9783642320095 Advances in Cryptology -- CRYPTO 2012 (Ran Canetti; Reihaneh Safavi-Naini)
- 9783642227929 Advances in Cryptology -- CRYPTO 2011 (Phillip Rogaway)
- 9783642146220 Advances in Cryptology -- CRYPTO 2010 (Tal Rabin)
- 9783642227912 Advances in Cryptology -- CRYPTO 2011 (Phillip Rogaway)
- 9783642320088 Advances in Cryptology - Crypto 2012: 32nd Annual Cryptology Conference, Santa Barbara, Ca, USA, August 19-23, 2012, Proceedings (Reihaneh Safavi-Naini; Ran Canetti)
< zum Archiv...