1990, ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [PU: SPRINGER NATURE Mrz 1990], COMPUTERS - COMPUTER SECURITY; / SECURITY GENERAL; BUSINESS & ECONOMICS INFORMATION MANAGEMENT; SCIENCE; THEORY; MANAGEMENT … Mehr…
AbeBooks.de BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
1990, ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [SC: 0.0], [PU: SPRINGER NATURE], COMPUTERS - COMPUTER SECURITY; / SECURITY GENERAL; BUSINESS & ECONOMICS INFORMATION MANAGEMENT; SCIENCE; THEORY; MANAGEMEN… Mehr…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
1990, ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [PU: SPRINGER NATURE Mrz 1990], COMPUTERS - COMPUTER SECURITY; / SCIENCE; INFORMATION THEORY; SECURITY GENERAL, This item is printed on demand - it takes 3-… Mehr…
AbeBooks.de Rheinberg-Buch Andreas Meier eK, Bergisch Gladbach, Germany [53870650] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
1990, ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [SC: 0.0], [PU: SPRINGER NATURE], COMPUTERS - COMPUTER SECURITY; / SCIENCE; INFORMATION THEORY; SECURITY GENERAL, Druck auf Anfrage Neuware - Printed after … Mehr…
ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Versandkosten:Versandkostenfrei. (EUR 0.00) Details... |
ISBN: 9780387971964
The papers in this voluriic were presented at the CHYP'I'O 'SS conf- ence on theory and applications of cryptography, Iicld August 21-2,j. 19SS in Sarita Uarbara, ('alifornia. The confere… Mehr…
BarnesandNoble.com new in stock. Versandkosten:zzgl. Versandkosten. Details... |
1990, ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [PU: SPRINGER NATURE Mrz 1990], COMPUTERS - COMPUTER SECURITY; / SECURITY GENERAL; BUSINESS & ECONOMICS INFORMATION MANAGEMENT; SCIENCE; THEORY; MANAGEMENT … Mehr…
1990, ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [SC: 0.0], [PU: SPRINGER NATURE], COMPUTERS - COMPUTER SECURITY; / SECURITY GENERAL; BUSINESS & ECONOMICS INFORMATION MANAGEMENT; SCIENCE; THEORY; MANAGEMEN… Mehr…
1990
ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [PU: SPRINGER NATURE Mrz 1990], COMPUTERS - COMPUTER SECURITY; / SCIENCE; INFORMATION THEORY; SECURITY GENERAL, This item is printed on demand - it takes 3-… Mehr…
1990, ISBN: 0387971963
[EAN: 9780387971964], Neubuch, [SC: 0.0], [PU: SPRINGER NATURE], COMPUTERS - COMPUTER SECURITY; / SCIENCE; INFORMATION THEORY; SECURITY GENERAL, Druck auf Anfrage Neuware - Printed after … Mehr…
ISBN: 9780387971964
The papers in this voluriic were presented at the CHYP'I'O 'SS conf- ence on theory and applications of cryptography, Iicld August 21-2,j. 19SS in Sarita Uarbara, ('alifornia. The confere… Mehr…
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Advances in Cryptology - CRYPTO '88: Proceedings Shafi Goldwasser Editor
EAN (ISBN-13): 9780387971964
ISBN (ISBN-10): 0387971963
Taschenbuch
Erscheinungsjahr: 1990
Herausgeber: Springer New York Core >1 >T
608 Seiten
Gewicht: 0,906 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2007-05-31T10:40:23+02:00 (Zurich)
Detailseite zuletzt geändert am 2024-01-05T11:47:27+01:00 (Zurich)
ISBN/EAN: 9780387971964
ISBN - alternative Schreibweisen:
0-387-97196-3, 978-0-387-97196-4
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: goldwasser shafi
Titel des Buches: advances cryptology proceedings crypto, les crypto, 403
Daten vom Verlag:
Autor/in: Shafi Goldwasser
Titel: Lecture Notes in Computer Science; Advances in Cryptology - CRYPTO '88 - Proceedings
Verlag: Springer; Springer US
591 Seiten
Erscheinungsjahr: 1990-03-13
New York; NY; US
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XI, 591 p.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; DES; Datenschutz; Kodierung; Kryptologie; Sicherheit; Substitution; Zufallszahl; complexity; cryptography; cryptology; Cryptology; Coding and Information Theory; Computer Communication Networks; IT in Business; Probability Theory; Statistics; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; Netzwerk-Hardware; Wirtschaftsmathematik und -informatik, IT-Management; Unternehmensanwendungen; Wahrscheinlichkeitsrechnung und Statistik; Stochastik; EA
Cryptographic Primitives.- Weakening Security Assumptions and Oblivious Transfer.- Limits on the Provable Consequences of One-way Permutations.- Generalized Secret Sharing and Monotone Functions.- Zero-Knowledge.- Everything Provable is Provable in Zero-Knowledge.- A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm.- Zero-Knowledge With Finite State Verifiers.- Number Theory.- Intractable Problems in Number Theory.- A Family of Jacobians Suitable for Discrete Log Cryptosystems.- Computation of Approximate L-th Roots Modulo n and Application to Cryptography.- Cryptanalysis.- On the McEliece Public-Key Cryptosystem.- A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers.- Pseudorandomness.- On the Existence of Pseudorandom Generators.- On The Randomness of Legendre and Jacobi Sequences.- Efficient, Perfect Random Number Generators.- Signatures and Authentication.- How To Sign Given Any Trapdoor Function.- A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge.- A Modification of the Fiat-Shamir Scheme.- An Improvement of the Fiat-Shamir Identification and Signature Scheme.- On the Theory of Security I.- A Basic Theory of Public and Private Cryptosystems.- Proving Security Against Chosen Ciphertext Attacks.- Non-Interactive Zero-Knowledge with Preprocessing.- On the Theory of Security II.- The Noisy Oracle Problem.- On Generating Solved Instances of Computational Problems.- Bounds and Constructions for Authentication - Secrecy Codes with Splitting.- Protocols.- Untraceable Electronic Cash.- Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals.- A Universal Problem in Secure and Verifiable Distributed Computation.- Security Concerns.- AnAbstract Theory of Computer Viruses.- Abuses in Cryptography and How to Fight Them.- How to (Really) Share a Secret.- Linear Complexity.- The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition.- On the Linear Syndrome Method in Cryptanalysis.- Aperiodic Linear Complexities of de Bruijn Sequences.- Systems.- The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities.- Speeding Up Secret Computations with Insecure Auxiliary Devices.- Developing Ethernet Enhanced-Security System.- A Secure Audio Teleconference System.- Short Rump Session Presentations.- Diffie-Hellman is as Strong as Discrete Log for Certain Primes.- Secret Error-Correcting Codes (SECC).- The Detection of Cheaters in Threshold Schemes.- On the Power of 1-way Functions.- “Practical IP” ? MA.- Zero-Knowledge Authentication Scheme with Secret Key Exchange.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9780387347998 Advances in Cryptology - CRYPTO '88 (Shafi Goldwasser)
- 9780387347998 Advances in Cryptology - CRYPTO '88 (Shafi Goldwasser)
- 9780387164632 Advances in Cryptology: Proceedings of Crypto 85 (Lecture Notes in Computer Science) (Hugh C. Williams)
- 9780387156583 Advances in Cryptology: Proceedings of Crypto 84 (Lecture Notes in Computer Science) (Blakely, G. R.)
< zum Archiv...