2009, ISBN: 9783540164630
Springer, Taschenbuch, Auflage: 1986, 564 Seiten, Publiziert: 2009-02-22T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: illustrations, 1.72 kg, Hardware & Technik, Computer & Internet, K… Mehr…
Amazon.de (Intern... |
2009, ISBN: 9783540164630
Springer, Taschenbuch, Auflage: 1986, 564 Seiten, Publiziert: 2009-02-22T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: illustrations, 1.72 kg, Hardware & Technik, Computer & Internet, K… Mehr…
Amazon.de (Intern... Versandkosten:Die angegebenen Versandkosten können von den tatsächlichen Kosten abweichen. (EUR 3.00) Details... |
1986, ISBN: 9783540164630
Editor: Williams, Hugh C. Springer, Paperback, Auflage: 1986, 564 Seiten, Publiziert: 1986-04-01T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: illustrations, 1.72 kg, Beginners & Introd… Mehr…
amazon.co.uk |
1986, ISBN: 3540164634
[EAN: 9783540164630], Gebraucht, sehr guter Zustand, [PU: Springer], 0387164634 Ex-library paperback in very nice condition with the usual markings and attachments., Books
AbeBooks.de GuthrieBooks, Spring Branch, TX, U.S.A. [52069477] [Rating: 5 (von 5)] NOT NEW BOOK. Versandkosten: EUR 42.18 Details... |
Advances in Cryptology: Proceedings of CRYPTO '85 (Lecture Notes in Computer Science) - Taschenbuch
1986, ISBN: 9783540164630
Springer, 1986-04-01. Paperback. Very Good. 0387164634 Ex-library paperback in very nice condition with the usual markings and attachments., Springer, 1986-04-01, 3
Biblio.co.uk |
Advances in Cryptology - CRYPT '85: Proceedings: Proceedings of CRYPTO '85 (Lecture Notes in Computer Science, 218, Band 218) - Taschenbuch
2009, ISBN: 9783540164630
Springer, Taschenbuch, Auflage: 1986, 564 Seiten, Publiziert: 2009-02-22T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: illustrations, 1.72 kg, Hardware & Technik, Computer & Internet, K… Mehr…
2009, ISBN: 9783540164630
Springer, Taschenbuch, Auflage: 1986, 564 Seiten, Publiziert: 2009-02-22T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: illustrations, 1.72 kg, Hardware & Technik, Computer & Internet, K… Mehr…
1986
ISBN: 9783540164630
Editor: Williams, Hugh C. Springer, Paperback, Auflage: 1986, 564 Seiten, Publiziert: 1986-04-01T00:00:01Z, Produktgruppe: Book, Hersteller-Nr.: illustrations, 1.72 kg, Beginners & Introd… Mehr…
1986, ISBN: 3540164634
[EAN: 9783540164630], Gebraucht, sehr guter Zustand, [PU: Springer], 0387164634 Ex-library paperback in very nice condition with the usual markings and attachments., Books
Bibliographische Daten des bestpassenden Buches
Detailangaben zum Buch - Advances in Cryptology: Proceedings of CRYPTO '85: 218 (Lecture Notes in Computer Science, 218)
EAN (ISBN-13): 9783540164630
ISBN (ISBN-10): 3540164634
Taschenbuch
Erscheinungsjahr: 1986
Herausgeber: Springer
564 Seiten
Gewicht: 0,842 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2008-01-28T12:29:55+01:00 (Zurich)
Detailseite zuletzt geändert am 2023-09-24T17:51:34+02:00 (Zurich)
ISBN/EAN: 9783540164630
ISBN - alternative Schreibweisen:
3-540-16463-4, 978-3-540-16463-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: hugh williams
Titel des Buches: advances cryptology proceedings crypto, conference proceedings, barbara, les crypto, lecture notes computer science cryptology crypto
Daten vom Verlag:
Autor/in: Hugh C. Williams
Titel: Lecture Notes in Computer Science; Advances in Cryptology - Proceedings of CRYPTO '85
Verlag: Springer; Springer Berlin
552 Seiten
Erscheinungsjahr: 1986-04-01
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XII, 552 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Theoretische Informatik; Verstehen; Computer; automata; calculus; computer science; cryptography; cryptology; information theory; Theory of Computation; Input/Output and Data Communications; Communications Engineering, Networks; Computerhardware; Nachrichtententechnik, Telekommunikation; EA
Signatures and authentication.- Breaking the Ong-Schnorr-Shamir Signature Scheme for Quadratic Number Fields.- Another Birthday Attack.- Attacks on Some RSA Signatures.- An Attack on a Signature Scheme Proposed by Okamoto and Shiraishi.- A Secure Subliminal Channel (?).- Unconditionally Secure Authentication Schemes and Practical and Theoretical Consequences.- Protocols.- On the Security of Ping-Pong Protocols when Implemented using the RSA (Extended Abstract).- A Secure Poker Protocol that Minimizes the Effect of Player Coalitions.- A Framework for the Study of Cryptographic Protocols.- Cheating at Mental Poker.- Security for the DoD Transmission Control Protocol.- Symmetric Public-Key Encryption.- Copy Protection.- Software Protection: Myth or Reality?.- Public Protection of Software.- Fingerprinting Long Forgiving Messages.- Single Key Cryptology.- Cryptanalysis of des with a Reduced Number of Rounds.- Is DES a Pure Cipher? (Results of More Cycling Experiments on DES) (Preliminary Abstract).- A Layered Approach to the Design of Private Key Cryptosystems.- Lifetimes of Keys in Cryptographic Key Management Systems.- Correlation Immunity and the Summation Generator.- Design of Combiners to Prevent Divide and Conquer Attacks.- On the Security of DES.- Information theory without the finiteness assumption, II. Unfolding the DES.- Two Key Cryptology.- Analysis of a Public Key Approach Based on Polynomial Substitution.- Developing an RSA Chip.- An M3 Public-Key Encryption Scheme.- Trapdoor Rings And Their Use In Cryptography.- On Computing Logarithms Over Finite Fields.- N Using RSA with Low Exponent in a Public Key Network.- Lenstra’s Factorisation Method Based on Elliptic Curves.- Use of Elliptic Curves in Cryptography.- Randomness and Other Problems.- Cryptography withCellular Automata.- Efficient Parallel Pseudo-Random Number Generation.- How to Construct Pseudo-random Permutations from Pseudo-random Functions.- The Bit Security of Modular Squaring given Partial Factorization of the Modulos.- Some Cryptographic Aspects of Womcodes.- How to Reduce your Enemy’s Information (extended abstract).- Encrypting Problem Instances.- Divergence Bounds on Key Equivocation and Error Probability in Cryptanalysis.- Impromptu Talks.- A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes.- On the Design of S-Boxes.- The Real Reason for Rivest’s Phenomenon.- The Importance of “Good” Key Scheduling Schemes (How to Make a Secure DES* Scheme with ? 48 Bit Keys?).- Access Control at the Netherlands Postal and Telecommunications Services.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9780387347998 Advances in Cryptology - CRYPTO '88 (Shafi Goldwasser)
- 9780387347998 Advances in Cryptology - CRYPTO '88 (Shafi Goldwasser)
- 9780387348056 Advances in Cryptology - CRYPTO '89 (Gilles Brassard)
- 9780306413667 Advances in Cryptology:Proceedings of Crypto 82 (David Chaum)
- 9780387156583 Advances in Cryptology: Proceedings of Crypto 84 (Lecture Notes in Computer Science) (Blakely, G. R.)
- 9780306416378 Advances in Cryptology: Proceedings of Crypto 83 (David Chaum)
< zum Archiv...