libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro
ARGOMENTO:  BOOKS > INFORMATICA > TESTI GENERALI

heys howard (curatore); adams carlisle (curatore) - selected areas in cryptography
Zoom

Selected Areas in Cryptography 6th Annual International Workshop, SAC'99 Kingston, Ontario, Canada, August 9-10, 1999 Proceedings

;




Disponibilità: Normalmente disponibile in 15 giorni


PREZZO
54,98 €
NICEPRICE
52,23 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, Carta della Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Pubblicazione: 02/2000
Edizione: 1





Trama

This book constitutes the thoroughly refereed post-workshop proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography, SAC'99, held in Kingston, Ontario, Canada in August 1999. The 17 revised full papers presented went through two rounds of reviewing and revision and were selected from 29 submissions. The papers are organized in sections on cryptosystems and pseudorandom number generators, security aspects of block cyphers, cryptoanalysis of block cyphers, efficient implementations of cryptosystems, and cryptography for network applications.




Sommario

Cryptosystems and Pseudorandom Number Generators.- A Universal Encryption Standard.- Yarrow-160: Notes on the Design and Analysis of the Yarrow Cryptographic Pseudorandom Number Generator.- Elliptic Curve Pseudorandom Sequence Generators.- Security Aspects of Block Ciphers.- Adaptive-Attack Norm for Decorrelation and Super-Pseudorandomness.- Guesswork and Variation Distance as Measures of Cipher Security.- Modeling Linear Characteristics of Substitution-Permutation Networks.- Strong Linear Dependence and Unbiased Distribution of Non-propagative Vectors.- Cryptanalysis of Block Ciphers.- Security of E2 against Truncated Differential Cryptanalysis.- Key-Schedule Cryptanalysis of DEAL.- Efficient Evaluation of Security against Generalized Interpolation Attack.- Efficient Implementations of Cryptosystems.- Efficient Implementation of Cryptosystems Based on Non-maximal Imaginary Quadratic Orders.- Improving and Extending the Lim/Lee Exponentiation Algorithm.- Software Optimization of Decorrelation Module.- Cryptography for Network Applications.- Pseudonym Systems.- Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures.- Protecting a Mobile Agent’s Route against Collusions.- Photuris: Design Criteria.










Altre Informazioni

ISBN:

9783540671855

Condizione: Nuovo
Collana: Lecture Notes in Computer Science
Dimensioni: 235 x 155 mm
Formato: Brossura
Illustration Notes:VIII, 241 p.
Pagine Arabe: 241
Pagine Romane: viii


Dicono di noi