Muutke küpsiste eelistusi

E-raamat: Advances in Cryptology - EUROCRYPT '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 Proceedings

Edited by
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 765
  • Ilmumisaeg: 13-May-2003
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540482857
Teised raamatud teemal:
  • Formaat - PDF+DRM
  • Hind: 55,56 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Sari: Lecture Notes in Computer Science 765
  • Ilmumisaeg: 13-May-2003
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Keel: eng
  • ISBN-13: 9783540482857
Teised raamatud teemal:

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

Eurocrypt is a series of open workshops on the theory andapplication of cryptographic techniques. These meetings havetaken place in Europe every year since 1982 and aresponsored by the International Association for CryptologicResearch.Eurocrypt '93 was held in the village of Lofthus in Norwayin May 1993. The call for papers resulted in 117 submissionswith authors representing 27 different countries. The 36accepted papers were selected by the program committee aftera blind refereeing process. The papers are grouped intoparts on authentication, public key, block ciphers, secretsharing, stream ciphers, digital signatures, protocols, hashfunctions, payment systems, and cryptanalysis. The volumeincludes 6 further rump session papers.

Muu info

Springer Book Archives
Authentication.- On the Relation Between A-Codes and Codes Correcting
Independent Errors.- Optimal Authentication Systems.- Public Key.- Factoring
Integers Using SIMD Sieves.- A New Elliptic Curve Based Analogue of RSA.-
Weaknesses of a public-key cryptosystem based on factorizations of finite
groups.- Block Ciphers.- Differentially uniform mappings for cryptography.-
On Almost Perfect Nonlinear Permutations.- Two New Classes of Bent
Functions.- Boolean functions satisfying a higher order strict avalanche
criterion.- Secret Sharing.- Size of Shares and Probability of Cheating in
Threshold Schemes.- Nonperfect Secret Sharing Schemes and Matroids.- Stream
ciphers.- From the memoirs of a Norwegian cryptologist.- On the Linear
Complexity of Products of Shift-Register Sequences.- Resynchronization
Weaknesses in Synchronous Stream Ciphers.- Blind Synchronization of
m-Sequences with Even Span.- On Constructions and Nonlinearity of Correlation
Immune Functions.- Digital signatures.- Practical and Provably Secure Release
of a Secret and Exchange of Signatures.- Subliminal Communication is Easy
Using the DSA.- Can O.S.S. be Repaired? - Proposal for a New Practical
Signature Scheme -.- Protocols I.- On a Limitation of BAN Logic.- Efficient
Anonymous Channel and All/Nothing Election Scheme.- Untransferable Rights in
a Client-Independent Server Environment.- Interactive Hashing Simplifies
Zero-Knowledge Protocol Design.- Hash Functions.- One-Way Accumulators: A
Decentralized Alternative to Digital Signatures.- The breaking of the AR Hash
Function.- Collisions for the compression function of MD5.- How to Find and
Avoid Collisions for the Knapsack Hash Function.- Payment Systems.- Single
Term Off-Line Coins.- Improved Privacy in Wallets with Observers.-
Distance-Bounding Protocols.- Cryptanalysis.- On the Distribution of
Characteristics in Bijective Mappings.- On the Security of the IDEA Block
Cipher.- Linear Cryptanalysis Method for DES Cipher.- New Types of
Cryptanalytic Attacks Using Related Keys.- Protocols II.- Secret-Key
Reconciliation by Public Discussion.- Global, Unpredictable Bit Generation
Without Broadcast.- Rump Session.- On Schnorrs Preprocessing for Digital
Signature Schemes.- Cryptanalysis of the Chang-Wu-Chen key distribution
system.- An Alternate Explanation of two BAN-logic failures.- The
Consequences of Trust in Shared Secret Schemes.- Markov Ciphers and
Alternating Groups.- On Key Distribution and Authentication in Mobile Radio
Networks.