- 5 Ergebnisse
Kleinster Preis: € 57,33, größter Preis: € 173,87, Mittelwert: € 94,04
1
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223)
Bestellen
bei amazon.de
€ 105,31
Versand: € 3,001
Bestellengesponserter Link

Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223) - Taschenbuch

2010, ISBN: 9783642146220

Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … Mehr…

Gebraucht, wie neu. Versandkosten:Gewöhnlich versandfertig in 6 bis 7 Tagen. Les coûts d'expédition peuvent différer des coûts réels. (EUR 3.00) DMI Media Europe
2
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223)
Bestellen
bei amazon.de
€ 173,87
Versand: € 3,001
Bestellengesponserter Link
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223) - Taschenbuch

2010, ISBN: 9783642146220

Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … Mehr…

Versandkosten:Les coûts d'expédition peuvent différer des coûts réels. (EUR 3.00)
3
Bestellen
bei alibris.co.uk
£ 49,53
(ca. € 57,52)
Bestellengesponserter Link
Tal Rabin:
Advances in Cryptologycrypto 2010 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 1519, 2010, Proceedings 6223 Lecture Notes in Computer Science - Taschenbuch

2007

ISBN: 9783642146220

Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… Mehr…

Versandkosten:zzgl. Versandkosten Fairford, GLOS, Paperbackshop International
4
Bestellen
bei alibris.co.uk
£ 49,37
(ca. € 57,33)
Bestellengesponserter Link
Rabin, Tal (Editor):
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings - Taschenbuch

2010, ISBN: 9783642146220

Trade paperback, New., Trade paperback (US). Glued binding. 744 p. Contains: Unspecified, Illustrations, black & white, Figures., Berlin, Heidelberg, [PU: Springer]

Versandkosten:zzgl. Versandkosten Sparks, NV, Alibris
5
Bestellen
bei AbeBooks.co.uk
£ 65,59
(ca. € 76,17)
Versand: € 6,991
Bestellengesponserter Link
Rabin, Tal (Editor):
Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - Taschenbuch

2010, ISBN: 3642146228

[EAN: 9783642146220], New book, [SC: 6.99], [PU: Springer-Verlag New York Inc], 744 pages. 9.00x6.00x1.25 inches. In Stock., Books

NEW BOOK. Versandkosten: EUR 6.99 Revaluation Books, Exeter, United Kingdom [2134736] [Rating: 5 (of 5)]

1Da einige Plattformen keine Versandkonditionen übermitteln und diese vom Lieferland, dem Einkaufspreis, dem Gewicht und der Größe des Artikels, einer möglichen Mitgliedschaft der Plattform, einer direkten Lieferung durch die Plattform oder über einen Drittanbieter (Marketplace), etc. abhängig sein können, ist es möglich, dass die von eurobuch angegebenen Versandkosten nicht mit denen der anbietenden Plattform übereinstimmen.

Bibliographische Daten des bestpassenden Buches

Details zum Buch
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223)

This book constitutes the refereed proceedings of the 30th Annual International Cryptology Conference, CRYPTO 2010, held in Santa Barbara, CA, USA in August 2010, co-located with CHES 2010, the workshop on Cryptographic Hardware and Embedded Systems. The 39 revised full papers presented were carefully reviewed and selected from 203 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on leakage, lattice, homomorphic encryption, theory and applications, key exchange, OAEP/RSA, CCA, attacks, composition, computation delegation and obfuscation, multiparty computation, pseudorandomness, and quantum.

Detailangaben zum Buch - Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223)


EAN (ISBN-13): 9783642146220
ISBN (ISBN-10): 3642146228
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2010
Herausgeber: Rabin, Tal, Springer
744 Seiten
Gewicht: 1,064 kg
Sprache: eng/Englisch

Buch in der Datenbank seit 2009-09-07T09:34:27+02:00 (Zurich)
Detailseite zuletzt geändert am 2023-06-09T15:19:04+02:00 (Zurich)
ISBN/EAN: 9783642146220

ISBN - alternative Schreibweisen:
3-642-14622-8, 978-3-642-14622-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: tal, rabin lea, craig charles, charles barbara, ieee computer society
Titel des Buches: crypto 2010, advances cryptology, barbara, les crypto, advances computer security, lecture notes computer science, august santa


Daten vom Verlag:

Autor/in: Tal Rabin
Titel: Security and Cryptology; Lecture Notes in Computer Science; Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Verlag: Springer; Springer Berlin
744 Seiten
Erscheinungsjahr: 2010-07-30
Berlin; Heidelberg; DE
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 744 p. 63 illus.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Hashing; Internet; Permutation; algebraic geometry; authentication; block ciphers; collision resistance; complexity; cryptography; embedded systems; security; trust; Cryptology; IT Operations; Computer Communication Networks; Data and Information Security; Computers and Society; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Mathematik für Informatiker; Diskrete Mathematik; EA

Leakage.- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability.- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.- Protecting Cryptographic Keys against Continual Leakage.- Securing Computation against Continuous Leakage.- Lattice.- An Efficient and Parallel Gaussian Sampler for Lattices.- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.- Homomorphic Encryption.- Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.- Additively Homomorphic Encryption with d-Operand Multiplications.- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.- Theory and Applications.- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.- Structure-Preserving Signatures and Commitments to Group Elements.- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.- Key Exchange, OAEP/RSA, CCA.- Credential Authenticated Identification and Key Exchange.- Password-Authenticated Session-Key Generation on the Internet in the Plain Model.- Instantiability of RSA-OAEP under Chosen-Plaintext Attack.- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.- Attacks.- Factorization of a 768-Bit RSA Modulus.- Correcting Errors in RSA Private Keys.- Improved Differential Attacks for ECHO and Grøstl.- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.- Composition.- Universally Composable Incoercibility.- Concurrent Non-Malleable Zero Knowledge Proofs.- Equivalence of Uniform Key Agreement and Composition Insecurity.- Computation Delegation and Obfuscation.- Non-interactive Verifiable Computing:Outsourcing Computation to Untrusted Workers.- Improved Delegation of Computation Using Fully Homomorphic Encryption.- Oblivious RAM Revisited.- On Strong Simulation and Composable Point Obfuscation.- Multiparty Computation.- Protocols for Multiparty Coin Toss with Dishonest Majority.- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.- Secure Multiparty Computation with Minimal Interaction.- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.- Pseudorandomness.- On Generalized Feistel Networks.- Cryptographic Extraction and Key Derivation: The HKDF Scheme.- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.- Quantum.- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.- Sampling in a Quantum Population, and Applications.
Up-to-date research in cryptology

< zum Archiv...