- 5 Ergebnisse
Kleinster Preis: € 52,00, größter Preis: € 128,49, Mittelwert: € 91,03
1
Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching,
Bestellen
bei BarnesandNoble.com
€ 109,99
Bestellengesponserter Link

Advances in Cryptology - ASIACRYPT 2007: 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, - neues Buch

2007, ISBN: 9783540768999

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, … Mehr…

new in stock. Versandkosten:zzgl. Versandkosten.
2
Bestellen
bei ZVAB.com
$ 62,36
(ca. € 57,68)
Versand: € 48,571
Bestellengesponserter Link

Kurosawa, Kaoru:

Advances in Cryptology – ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings - Taschenbuch

2007, ISBN: 3540768998

[EAN: 9783540768999], Gebraucht, guter Zustand, [SC: 48.57], [PU: Springer Berlin], ELLIPTIC CURVES,BLOCK CIPHERS,CRYPTOLOGY,ANONYMITY,ALGORITHM ANALYSIS AND PROBLEM COMPLEXITY,CRYPTOGRAP… Mehr…

NOT NEW BOOK. Versandkosten: EUR 48.57 Buchpark, Trebbin, Germany [83435977] [Rating: 5 (von 5)]
3
Bestellen
bei buchfreund.de
€ 52,00
Versand: € 0,001
Bestellengesponserter Link
Kaoru Kurosawa:
Advances in Cryptology ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings 2007 - gebrauchtes Buch

2007

ISBN: 9783540768999

2007 Neubindung, Ausgabe 2007 4066572/12 Versandkostenfreie Lieferung elliptic, curves, block, ciphers, cryptology, anonymity, algorithm, analysis, problem, complexity, cryptography, da… Mehr…

Versandkosten:Versandkostenfrei innerhalb der BRD. (EUR 0.00) Buchpark GmbH, 14959 Trebbin
4
Advances in Cryptology ASIACRYPT 2007
Bestellen
bei Hugendubel.de
€ 106,99
Versand: € 0,001
Bestellengesponserter Link
Advances in Cryptology ASIACRYPT 2007 - Taschenbuch

2007, ISBN: 9783540768999

*Advances in Cryptology ASIACRYPT 2007* - 13th International Conference on the Theory and Application of Cryptology and Information Security Kuching Malaysia December 2-6 2007 Proceedings… Mehr…

Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)
5
Advances in Cryptology ASIACRYPT 2007
Bestellen
bei Hugendubel.de
€ 128,49
Versand: € 0,001
Bestellengesponserter Link
Advances in Cryptology ASIACRYPT 2007 - Taschenbuch

2007, ISBN: 9783540768999

Advances in Cryptology ASIACRYPT 2007 ab 128.49 € als Taschenbuch: 13th International Conference on the Theory and Application of Cryptology and Information Security Kuching Malaysia Dece… Mehr…

Versandkosten:Shipping in 3 days, , Versandkostenfrei nach Hause oder Express-Lieferung in Ihre Buchhandlung., DE. (EUR 0.00)

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Advances in Cryptology ASIACRYPT 2007

This book constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December 2007. The papers are organized in topical sections on number theory and elliptic curve, protocol, hash function design, group/broadcast cryptography, mac and implementation, multiparty computation, block ciphers, foundation, public key encryption, and cryptanalysis.

Detailangaben zum Buch - Advances in Cryptology ASIACRYPT 2007


EAN (ISBN-13): 9783540768999
ISBN (ISBN-10): 3540768998
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2007
Herausgeber: Springer Berlin Heidelberg
581 Seiten
Gewicht: 0,892 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2007-12-04T13:01:43+01:00 (Zurich)
Detailseite zuletzt geändert am 2024-04-01T19:35:24+02:00 (Zurich)
ISBN/EAN: 9783540768999

ISBN - alternative Schreibweisen:
3-540-76899-8, 978-3-540-76899-9
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: kaoru, kurosawa, kuros
Titel des Buches: information security applications, 13th, science information theory, asia, malaysia, advances information computer security, advances cryptology asiacrypt 2006, advances cryptology asiacrypt 2004, international conference computer science, advance, application security, kurosawa


Daten vom Verlag:

Autor/in: Kaoru Kurosawa
Titel: Lecture Notes in Computer Science; Security and Cryptology; Advances in Cryptology – ASIACRYPT 2007 - 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007, Proceedings
Verlag: Springer; Springer Berlin
583 Seiten
Erscheinungsjahr: 2007-11-12
Berlin; Heidelberg; DE
Sprache: Englisch
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
Available
XIV, 583 p.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Mathematik; Public Key; anonymity; block ciphers; computational algebra; cryptanalysis; cryptographic protocols; cryptography; cryptology; data security; digital signature schemes; elliptic curves; group signatures; hash functions; information; number theory; algorithm analysis and problem complexity; Coding and Information Theory; Cryptology; Data and Information Security; Algorithms; IT Operations; Computer Communication Networks; Informationstheorie; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Algorithmen und Datenstrukturen; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; EA

Number Theory and Elliptic Curve.- A Kilobit Special Number Field Sieve Factorization.- When e-th Roots Become Easier Than Factoring.- Faster Addition and Doubling on Elliptic Curves.- Protocol.- A Non-interactive Shuffle with Pairing Based Verifiability.- On Privacy Models for RFID.- Invited Talk I.- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust.- A Simple Variant of the Merkle-Damgård Scheme with a Permutation.- Seven-Property-Preserving Iterated Hashing: ROX.- How to Build a Hash Function from Any Collision-Resistant Function.- Fully Anonymous Group Signatures Without Random Oracles.- Group Encryption.- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys.- Boosting Merkle-Damgård Hashing for Message Authentication.- On Efficient Message Authentication Via Block Cipher Design Techniques.- Symmetric Key Cryptography on Modern Graphics Hardware.- Multiparty Computation I.- Blind Identity-Based Encryption and Simulatable Oblivious Transfer.- Multi-party Indirect Indexing and Applications.- Two-Party Computing with Encrypted Data.- Known-Key Distinguishers for Some Block Ciphers.- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.- On Tweaking Luby-Rackoff Blockciphers.- Multiparty Computation II.- Secure Protocols with Asymmetric Trust.- Simple and Efficient Perfectly-Secure Asynchronous MPC.- Efficient Byzantine Agreement with Faulty Minority.- Information-Theoretic Security Without an Honest Majority.- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.- Anonymous Quantum Communication.- Invited Talk II.- Authenticated Key Exchange and Key Encapsulation in the StandardModel.- Miniature CCA2 PK Encryption: Tight Security Without Redundancy.- Bounded CCA2-Secure Encryption.- Relations Among Notions of Non-malleability for Encryption.- Cryptanalysis of the Tiger Hash Function.- Cryptanalysis of Grindahl.- A Key Recovery Attack on Edon80.

< zum Archiv...