Articoli correlati a Advances in Cryptology - ASIACRYPT 2009: 15th International...

Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, . ... Japan, December 6-10, 2009, Proceedings: 5912 - Brossura

 
9783642103650: Advances in Cryptology - ASIACRYPT 2009: 15th International Conference on the Theory and Application of Cryptology and Information Security, Tokyo, . ... Japan, December 6-10, 2009, Proceedings: 5912
Vedi tutte le copie di questo ISBN:
 
 
This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels.

Le informazioni nella sezione "Riassunto" possono far riferimento a edizioni diverse di questo titolo.

Contenuti:
Block Ciphers.- Related-Key Cryptanalysis of the Full AES-192 and AES-256.- The Key-Dependent Attack on Block Ciphers.- Cascade Encryption Revisited.- Quantum and Post-Quantum.- Quantum-Secure Coin-Flipping and Applications.- On the Power of Two-Party Quantum Cryptography.- Security Bounds for the Design of Code-Based Cryptosystems.- Hash Functions I.- Rebound Attack on the Full Lane Compression Function.- Rebound Distinguishers: Results on the Full Whirlpool Compression Function.- MD5 Is Weaker Than Weak: Attacks on Concatenated Combiners.- The Intel AES Instructions Set and the SHA-3 Candidates.- Encryption Schemes.- Group Encryption: Non-interactive Realization in the Standard Model.- On Black-Box Constructions of Predicate Encryption from Trapdoor Permutations.- Hierarchical Predicate Encryption for Inner-Products.- Hedged Public-Key Encryption: How to Protect against Bad Randomness.- Multi Party Computation.- Secure Two-Party Computation Is Practical.- Secure Multi-party Computation Minimizing Online Rounds.- Improved Non-committing Encryption with Applications to Adaptively Secure Protocols.- Cryptographic Protocols.- Non-malleable Statistically Hiding Commitment from Any One-Way Function.- Proofs of Storage from Homomorphic Identification Protocols.- Simple Adaptive Oblivious Transfer without Random Oracle.- Hash Functions II.- Improved Generic Algorithms for 3-Collisions.- A Modular Design for Hash Functions: Towards Making the Mix-Compress-Mix Approach Practical.- How to Confirm Cryptosystems Security: The Original Merkle-Damgård Is Still Alive!.- Models and Frameworks I.- On the Analysis of Cryptographic Assumptions in the Generic Ring Model.- Zero Knowledge in the Random Oracle Model, Revisited.- A Framework for Universally Composable Non-committing Blind Signatures.- Cryptanalysis: Sqaure and Quadratic.- Cryptanalysis of the Square Cryptosystems.- Factoring pq 2 with Quadratic Forms: Nice Cryptanalyses.- Attacking Power Generators Using Unravelled Linearization: When Do We Output Too Much?.- Models and Frameworks II.- Security Notions and Generic Constructions for Client Puzzles.- Foundations of Non-malleable Hash and One-Way Functions.- Hash Functions III.- Improved Cryptanalysis of Skein.- Linearization Framework for Collision Attacks: Application to CubeHash and MD6.- Preimages for Step-Reduced SHA-2.- Lattice-Based.- Fiat-Shamir with Aborts: Applications to Lattice and Factoring-Based Signatures.- Efficient Public Key Encryption Based on Ideal Lattices.- Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices.- Side Channels.- PSS Is Secure against Random Fault Attacks.- Cache-Timing Template Attacks.- Memory Leakage-Resilient Encryption Based on Physically Unclonable Functions.- Signature Schemes with Bounded Leakage Resilience.
Product Description:
Rare Book

Le informazioni nella sezione "Su questo libro" possono far riferimento a edizioni diverse di questo titolo.

  • EditoreSpringer
  • Data di pubblicazione2009
  • ISBN 10 3642103650
  • ISBN 13 9783642103650
  • RilegaturaCopertina flessibile
  • Numero edizione1
  • Numero di pagine740
  • RedattoreMatsui Mitsuru

I migliori risultati di ricerca su AbeBooks

Immagini fornite dal venditore

Editore: Springer (2009)
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Soft Cover Quantità: 10
Print on Demand
Da:
booksXpress
(Bayonne, NJ, U.S.A.)
Valutazione libreria

Descrizione libro Soft Cover. Condizione: new. This item is printed on demand. Codice articolo 9783642103650

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 54,19
Convertire valuta

Aggiungere al carrello

Spese di spedizione: GRATIS
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Editore: Springer (2009)
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Brossura Quantità: > 20
Da:
Lucky's Textbooks
(Dallas, TX, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: New. Codice articolo ABLING22Oct2817100464236

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 57,00
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 3,68
In U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Mitsuru Matsui
Editore: Springer (2009)
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Brossura Quantità: > 20
Print on Demand
Da:
Ria Christie Collections
(Uxbridge, Regno Unito)
Valutazione libreria

Descrizione libro Condizione: New. PRINT ON DEMAND Book; New; Fast Shipping from the UK. No. book. Codice articolo ria9783642103650_lsuk

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 59,21
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 11,72
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi
Immagini fornite dal venditore

Mitsuri Matsui
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Taschenbuch Quantità: 2
Print on Demand
Da:
BuchWeltWeit Ludwig Meier e.K.
(Bergisch Gladbach, Germania)
Valutazione libreria

Descrizione libro Taschenbuch. Condizione: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels. 740 pp. Englisch. Codice articolo 9783642103650

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 53,49
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 23,00
Da: Germania a: U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Matsui
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Brossura Quantità: 15
Valutazione libreria

Descrizione libro Condizione: New. Includes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. This title contains sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, and multi party computation. Series: Lecture Notes in Computer Science / Security and Cryptology. Num Pages: 736 pages, biography. BIC Classification: PBD; PBW; UMB; URY. Category: (P) Professional & Vocational. Dimension: 235 x 155 x 30. Weight in Grams: 1116. . 2009. Paperback. . . . . Codice articolo V9783642103650

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 78,10
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 10,50
Da: Irlanda a: U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Matsui, Mitsuri (Editor)
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Paperback Quantità: 2
Da:
Revaluation Books
(Exeter, Regno Unito)
Valutazione libreria

Descrizione libro Paperback. Condizione: Brand New. 1st edition. 722 pages. 9.29x6.14x1.18 inches. In Stock. Codice articolo x-3642103650

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 77,17
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 11,74
Da: Regno Unito a: U.S.A.
Destinazione, tempi e costi
Immagini fornite dal venditore

Mitsuri Matsui
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Taschenbuch Quantità: 1
Da:
AHA-BUCH GmbH
(Einbeck, Germania)
Valutazione libreria

Descrizione libro Taschenbuch. Condizione: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were carefully reviewed and selected from 298 submissions. The papers are organized in topical sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, multi party computation, cryptographic protocols, hash funtions II, models and frameworks I, cryptoanalysis: square and quadratic, models and framework II, hash functions III, lattice-based, and side channels. Codice articolo 9783642103650

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 58,89
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 32,99
Da: Germania a: U.S.A.
Destinazione, tempi e costi
Immagini fornite dal venditore

Matsui, Mitsuri
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Kartoniert / Broschiert Quantità: > 20
Print on Demand
Da:
moluna
(Greven, Germania)
Valutazione libreria

Descrizione libro Kartoniert / Broschiert. Condizione: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. This book constitutes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. The 41 revised full papers presented were caref. Codice articolo 5049218

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 48,37
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 48,99
Da: Germania a: U.S.A.
Destinazione, tempi e costi
Foto dell'editore

Matsui
ISBN 10: 3642103650 ISBN 13: 9783642103650
Nuovo Brossura Quantità: 15
Da:
Kennys Bookstore
(Olney, MD, U.S.A.)
Valutazione libreria

Descrizione libro Condizione: New. Includes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. This title contains sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, and multi party computation. Series: Lecture Notes in Computer Science / Security and Cryptology. Num Pages: 736 pages, biography. BIC Classification: PBD; PBW; UMB; URY. Category: (P) Professional & Vocational. Dimension: 235 x 155 x 30. Weight in Grams: 1116. . 2009. Paperback. . . . . Books ship from the US and Ireland. Codice articolo V9783642103650

Informazioni sul venditore | Contatta il venditore

Compra nuovo
EUR 96,78
Convertire valuta

Aggiungere al carrello

Spese di spedizione: EUR 9,68
In U.S.A.
Destinazione, tempi e costi