This volume presents the proceedings of the eleventh in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All theoretical and practical aspects of cryptology are represented.
Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.
Protocol Design and Analysis.- A Calculus for Access Control in Distributed Systems.- Deriving the Complete Knowledge of Participants in Cryptographic Protocols.- Systematic Design of Two-Party Authentication Protocols.- Combinatorics and Authentication.- Combinatorial characterizations of authentication codes.- Universal hashing and authentication codes.- On Correlation-immune functions.- Secret Sharing and Information Theory.- On the Size of Shares for Secret Sharing Schemes.- On Verification in Secret Sharing.- Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing.- Multiparty Secret Key Exchange Using a Random Deal of Cards.- Cryptanalysis.- Differential Cryptanalysis of Snefru, Khafre, REDOC-II, LOKI and Lucifer.- A Known Plaintext Attack of FEAL-4 and FEAL-6.- A switching closure test to analyze cryptosystems.- An Attack on the Last Two Rounds of MD4.- The Cryptanalysis of a New Public-Key Cryptosystem based on Modular Knapsacks.- Complexity Theory.- A One-Round, Two-Prover, Zero-Knowledge Protocol for NP.- Interactive Proofs with Space Bounded Provers.- Functional Inversion and Communication Complexity.- The Use of Interaction in Public Cryptosystems..- Cryptographic Schemes Based on Number Theory.- New Public-Key Schemes Based on Elliptic Curves over the Ring Zn.- Efficient Algorithms for the Construction of Hyperelliptic Cryptosystems.- CM-Curves with Good Cryptographic Properties.- A New ID-Based Key Sharing System.- Pseudorandomness.- Pseudo-random Generators from One-way Functions.- New Results on Pseudorandom Permutation Generators Based on the Des Scheme.- Applications and Implementations.- Faster Modular Multiplication by Operand Scaling.- Universal Electronic Cash.- How to Break and Repair a “Provably Secure” Untraceable Payment System.- Practical Quantum Oblivious Transfer.- Exploiting Parallelism in Hardware Implementation of the DES.- Secure Computation Protocols.- Foundations of Secure Interactive Computing.- Secure Computation.- A Cryptographic Scheme for Computerized General Elections.- Efficient Multiparty Protocols Using Circuit Randomization.- Public-Key Cryptosystems and Signatures.- Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack.- Towards Practical Public Key Systems Secure Against Chosen Ciphertext attacks.- Shared generation of authenticators and signatures.- Cryptographically Strong Undeniable Signatures, Unconditionally Secure for the Signer.
Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.
EUR 10,39 per la spedizione da Giappone a Italia
Destinazione, tempi e costiEUR 9,70 per la spedizione da Germania a Italia
Destinazione, tempi e costiDa: Corner of a Foreign Field, Tokyo, TOKYO, Giappone
Soft cover. Condizione: Fair. No Jacket. 1992.Softcover.Fair condition.485 pages.Ships from Japan.Usually ships in 1-2 working days. Codice articolo 26699
Quantità: 1 disponibili
Da: moluna, Greven, Germania
Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This volume presents the proceedings of the eleventh in a series of workshops on cryptology sponsored by the International Association for Cryptologic Research. All theoretical and practical aspects of cryptology are represented.Protocol Design and Anal. Codice articolo 4893488
Quantità: Più di 20 disponibili
Da: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germania
Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Crypto '91 was the eleventh in a series of workshops oncryptology sponsoredby the International Association forCryptologic Research and was held in Santa Barbara,California, in August 1991.This volume contains a full paper or an extended abstractfor each of the 39 talks presented at the workshop. Alltheoretical and practical aspects of cryptology arerepresented, including: protocol design and analysis,combinatorics and authentication, secret sharing andinformation theory, cryptanalysis, complexity theory,cryptographic schemas based on number theory,pseudorandomness, applications and implementations, viruses,public-key cryptosystems, and digital signatures. 496 pp. Englisch. Codice articolo 9783540551881
Quantità: 2 disponibili
Da: AHA-BUCH GmbH, Einbeck, Germania
Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - Crypto '91 was the eleventh in a series of workshops oncryptology sponsoredby the International Association forCryptologic Research and was held in Santa Barbara,California, in August 1991.This volume contains a full paper or an extended abstractfor each of the 39 talks presented at the workshop. Alltheoretical and practical aspects of cryptology arerepresented, including: protocol design and analysis,combinatorics and authentication, secret sharing andinformation theory, cryptanalysis, complexity theory,cryptographic schemas based on number theory,pseudorandomness, applications and implementations, viruses,public-key cryptosystems, and digital signatures. Codice articolo 9783540551881
Quantità: 1 disponibili
Da: buchversandmimpf2000, Emtmannsberg, BAYE, Germania
Taschenbuch. Condizione: Neu. Neuware -Crypto '91 was the eleventh in a series of workshops oncryptology sponsoredby the International Association forCryptologic Research and was held in Santa BarbaraCalifornia, in August 1991.This volume contains a full paper or an extended abstractfor each of the 39 talks presented at the workshop. Alltheoretical and practical aspects of cryptology arerepresented, including: protocol design and analysiscombinatorics and authentication, secret sharing andinformation theory, cryptanalysis, complexity theorycryptographic schemas based on number theorypseudorandomness, applications and implementations, virusespublic-key cryptosystems, and digital signatures.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 496 pp. Englisch. Codice articolo 9783540551881
Quantità: 2 disponibili
Da: Ria Christie Collections, Uxbridge, Regno Unito
Condizione: New. In. Codice articolo ria9783540551881_new
Quantità: Più di 20 disponibili
Da: Chiron Media, Wallingford, Regno Unito
PF. Condizione: New. Codice articolo 6666-IUK-9783540551881
Quantità: 10 disponibili
Da: Books Puddle, New York, NY, U.S.A.
Condizione: New. pp. 496. Codice articolo 26133915484
Quantità: 4 disponibili
Da: Biblios, Frankfurt am main, HESSE, Germania
Condizione: New. PRINT ON DEMAND pp. 496. Codice articolo 18133915478
Quantità: 4 disponibili
Da: Revaluation Books, Exeter, Regno Unito
Paperback. Condizione: Brand New. 1992 edition. 496 pages. 9.25x6.10x1.00 inches. In Stock. Codice articolo x-3540551883
Quantità: 2 disponibili