Muutke küpsiste eelistusi

Advances in Cryptology EUROCRYPT 93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 2327, 1993 Proceedings 1994 ed. [Pehme köide]

Edited by
  • Formaat: Paperback / softback, 465 pages, kõrgus x laius: 235x155 mm, kaal: 730 g, X, 465 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 765
  • Ilmumisaeg: 28-Jan-1994
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540576002
  • ISBN-13: 9783540576006
Teised raamatud teemal:
  • Pehme köide
  • Hind: 48,70 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 57,29 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, 465 pages, kõrgus x laius: 235x155 mm, kaal: 730 g, X, 465 p., 1 Paperback / softback
  • Sari: Lecture Notes in Computer Science 765
  • Ilmumisaeg: 28-Jan-1994
  • Kirjastus: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • ISBN-10: 3540576002
  • ISBN-13: 9783540576006
Teised raamatud teemal:
Eurocrypt is a series of open workshops on the theory andapplication of cryptographic techniques. These meetings havetaken place in Europe every year since 1982 and aresponsored by the International Association for CryptologicResearch.Eurocrypt '93 was held in the village of Lofthus in Norwayin May 1993. The call for papers resulted in 117 submissionswith authors representing 27 different countries. The 36accepted papers were selected by the program committee aftera blind refereeing process. The papers are grouped intoparts on authentication, public key, block ciphers, secretsharing, stream ciphers, digital signatures, protocols, hashfunctions, payment systems, and cryptanalysis. The volumeincludes 6 further rump session papers.

Muu info

Springer Book Archives
Authentication.- On the Relation Between A-Codes and Codes Correcting
Independent Errors.- Optimal Authentication Systems.- Public Key.- Factoring
Integers Using SIMD Sieves.- A New Elliptic Curve Based Analogue of RSA.-
Weaknesses of a public-key cryptosystem based on factorizations of finite
groups.- Block Ciphers.- Differentially uniform mappings for cryptography.-
On Almost Perfect Nonlinear Permutations.- Two New Classes of Bent
Functions.- Boolean functions satisfying a higher order strict avalanche
criterion.- Secret Sharing.- Size of Shares and Probability of Cheating in
Threshold Schemes.- Nonperfect Secret Sharing Schemes and Matroids.- Stream
ciphers.- From the memoirs of a Norwegian cryptologist.- On the Linear
Complexity of Products of Shift-Register Sequences.- Resynchronization
Weaknesses in Synchronous Stream Ciphers.- Blind Synchronization of
m-Sequences with Even Span.- On Constructions and Nonlinearity of Correlation
Immune Functions.- Digital signatures.- Practical and Provably Secure Release
of a Secret and Exchange of Signatures.- Subliminal Communication is Easy
Using the DSA.- Can O.S.S. be Repaired? - Proposal for a New Practical
Signature Scheme -.- Protocols I.- On a Limitation of BAN Logic.- Efficient
Anonymous Channel and All/Nothing Election Scheme.- Untransferable Rights in
a Client-Independent Server Environment.- Interactive Hashing Simplifies
Zero-Knowledge Protocol Design.- Hash Functions.- One-Way Accumulators: A
Decentralized Alternative to Digital Signatures.- The breaking of the AR Hash
Function.- Collisions for the compression function of MD5.- How to Find and
Avoid Collisions for the Knapsack Hash Function.- Payment Systems.- Single
Term Off-Line Coins.- Improved Privacy in Wallets with Observers.-
Distance-Bounding Protocols.- Cryptanalysis.- On the Distribution of
Characteristics in Bijective Mappings.- On the Security of the IDEA Block
Cipher.- Linear Cryptanalysis Method for DES Cipher.- New Types of
Cryptanalytic Attacks Using Related Keys.- Protocols II.- Secret-Key
Reconciliation by Public Discussion.- Global, Unpredictable Bit Generation
Without Broadcast.- Rump Session.- On Schnorrs Preprocessing for Digital
Signature Schemes.- Cryptanalysis of the Chang-Wu-Chen key distribution
system.- An Alternate Explanation of two BAN-logic failures.- The
Consequences of Trust in Shared Secret Schemes.- Markov Ciphers and
Alternating Groups.- On Key Distribution and Authentication in Mobile Radio
Networks.