Bitte haben Sie einen Moment Geduld, wir legen Ihr Produkt in den Warenkorb.
Bitte haben Sie einen Moment Geduld, wir legen Ihr Produkt in den Warenkorb.
| Reihe | Lecture Notes in Computer Science |
|---|---|
| Themen | Lexika Forschung und Information, allgemein Kodierungstheorie und Verschlüsselung (Kryptologie) |
| ISBN | 9783540302766 |
| Sprache | Englisch |
| Erscheinungsdatum | 09.12.2005 |
| Größe | 235 x 155 mm |
| Verlag | Springer |
| Herausgegeben von | Nigel Smart |
| Lieferzeit | Lieferung in 7-14 Werktagen |
| Herstellerangaben | Anzeigen Europaplatz 3 | DE-69115 Heidelberg ProductSafety@springernature.com |
Invited Papers.- Abstract Models of Computation in Cryptography.- Pairing-Based Cryptography at High Security Levels.- Improved Decoding of Interleaved AG Codes.- Coding Theory.- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics.- A Trellis-Based Bound on (2,1)-Separating Codes.- Tessellation Based Multiple Description Coding.- Exploiting Coding Theory for Collision Attacks on SHA-1.- Signatures and Signcryption.- Hash Based Digital Signature Schemes.- A General Construction for Simultaneous Signing and Encrypting.- Non-interactive Designated Verifier Proofs and Undeniable Signatures.- Symmetric Cryptography.- Partial Key Recovery Attacks on XCBC, TMAC and OMAC.- Domain Expansion of MACs: Alternative Uses of the FIL-MAC.- Normality of Vectorial Functions.- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128.- Side Channels.- The Physically Observable Security of Signature Schemes.- On the Automatic Construction of Indistinguishable Operations.- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods.- Algebraic Cryptanalysis.- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem.- An Algebraic Framework for Cipher Embeddings.- Probabilistic Algebraic Attacks.- Information Theoretic Applications.- Unconditionally Secure Information Authentication in Presence of Erasures.- Generalized Strong Extractors and Deterministic Privacy Amplification.- On Threshold Self-healing Key Distribution Schemes.- Number Theoretic Foundations.- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator.- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited.- Pairings on Elliptic Curves over Finite Commutative Rings.- Public Key and ID-Based Encryption Schemes.- A Key Encapsulation Mechanism for NTRU.- Efficient Identity-Based Key Encapsulation to Multiple Parties.- Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme.
| Reihe | Lecture Notes in Computer Science |
|---|---|
| Themen | Lexika Forschung und Information, allgemein Kodierungstheorie und Verschlüsselung (Kryptologie) |
| ISBN | 9783540302766 |
| Sprache | Englisch |
| Erscheinungsdatum | 09.12.2005 |
| Größe | 235 x 155 mm |
| Verlag | Springer |
| Herausgegeben von | Nigel Smart |
| Lieferzeit | Lieferung in 7-14 Werktagen |
| Herstellerangaben | Anzeigen Europaplatz 3 | DE-69115 Heidelberg ProductSafety@springernature.com |
Wie gefällt Ihnen unser Shop?