Kategorien
Konto
Anmelden / Registrieren
Warenkorb
 
 

Selected Areas in Cryptography


Menge:  Stück  
Produktinformationen
cover
cover
Artikel-Nr.:
     5667A-9783540430667
Hersteller:
     Springer Verlag
Herst.-Nr.:
     9783540430667
EAN/GTIN:
     9783540430667
Suchbegriffe:
Allgemeine Informatikbücher
Bücher für Datenbanken - englischsp...
Datenbanken (Fachbücher)
Datenbankenbücher
Cryptanalysis I.- Weaknesses in the Key Scheduling Algorithm of RC4.- A Practical Cryptanalysis of SSC2.- Analysis of the E 0 Encryption System.- Boolean Functions.- Boolean Functions with Large Distance to All Bijective Monomials: N Odd Case.- Linear Codes in Constructing Resilient Functions with High Nonlinearity.- New Covering Radius of Reed-Muller Codes for t-Resilient Functions.- Generalized Zig-zag Functions and Oblivious Transfer Reductions.- Rijndael.- A Simple Algebraic Representation of Rijndael.- Improving the Upper Bound on the Maximum Average Linear Hull Probability for Rijndael.- Invited Talk I.- Polynomial Reconstruction Based Cryptography.- Elliptic Curves and Efficient Implementation I.- An Improved Implementation of Elliptic Curves over GF(2 n ) when Using Projective Point Arithmetic.- Fast Generation of Pairs (k, [k]P) for Koblitz Elliptic Curves.- Algorithms for Multi-exponentiation.- Two Topics in Hyperelliptic Cryptography.- Cryptanalysis II.- A Differential Attack on Reduced-Round SC2000.- On the Complexity of Matsui's Attack.- Random Walks Revisited: Extensions of Pollard's Rho Algorithm for Computing Multiple Discrete Logarithms.- Elliptic Curves and Efficient Implementation II.- Fast Normal Basis Multiplication Using General Purpose Processors.- Fast Multiplication of Integers for Public-Key Applications.- Fast Simultaneous Scalar Multiplication on Elliptic Curve with Montgomery Form.- On the Power of Multidoubling in Speeding Up Elliptic Scalar Multiplication.- Public Key Systems.- The GH Public-Key Cryptosystem.- XTR Extended to GF(p 6m ).- Invited Talk II.- The Two Faces of Lattices in Cryptology.- Protocols and Mac.- New (Two-Track-)MAC Based on the Two Trails of RIPEMD.- Key Revocation with Interval Cover Families.- Timed-ReleaseCryptography.
Weitere Informationen:
Author:
Serge Vaudenay; Amr M. Youssef
Verlag:
Springer Berlin
Sprache:
eng
Weitere Suchbegriffe: allgemeine Informatikbücher - englischsprachig, allgemeine informatikbücher - englischsprachig, Datenverarbeitung / Datenverschlüsselung, Kryptografie, Kryptografie, Verschlüsselung, Advanced Encryption Standard, Boolean function, Coding Theory, Computational Number Theory, Data Security, Information Security, Network Security, Privacy
Die Konditionen im Überblick1
Lieferzeit
Lagerstand
Preis
€ 49,99*
Konditionen selbst auswählen
Artikel empfehlenArtikel merken
* Preise mit Sternchen sind Nettopreise zzgl. gesetzlich gültiger MwSt.
UVP bedeutet „Unverbindliche Preisempfehlung“
Unser Angebot richtet sich ausschließlich an Unternehmen, Gewerbetreibende und Freiberufler.