
2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … Mehr…
amazon.de DMI Media Europe Gebraucht, wie neu. Versandkosten:Gewöhnlich versandfertig in 6 bis 7 Tagen. Les coûts d'expédition peuvent différer des coûts réels. (EUR 3.00) Details... |

2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … Mehr…
amazon.de Versandkosten:Les coûts d'expédition peuvent différer des coûts réels. (EUR 3.00) Details... |

Advances in Cryptologycrypto 2010 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 1519, 2010, Proceedings 6223 Lecture Notes in Computer Science - Taschenbuch
2007, ISBN: 9783642146220
Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… Mehr…
alibris.co.uk |

Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings - Taschenbuch
2010, ISBN: 9783642146220
Trade paperback, New., Trade paperback (US). Glued binding. 744 p. Contains: Unspecified, Illustrations, black & white, Figures., Berlin, Heidelberg, [PU: Springer]
alibris.co.uk |

Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - Taschenbuch
2010, ISBN: 3642146228
[EAN: 9783642146220], New book, [SC: 6.99], [PU: Springer-Verlag New York Inc], 744 pages. 9.00x6.00x1.25 inches. In Stock., Books
AbeBooks.co.uk Revaluation Books, Exeter, United Kingdom [2134736] [Rating: 5 (of 5)] NEW BOOK. Versandkosten: EUR 6.99 Details... |


Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223) - Taschenbuch
2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … Mehr…

2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … Mehr…
Advances in Cryptologycrypto 2010 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 1519, 2010, Proceedings 6223 Lecture Notes in Computer Science - Taschenbuch
2007
ISBN: 9783642146220
Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… Mehr…
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings - Taschenbuch
2010, ISBN: 9783642146220
Trade paperback, New., Trade paperback (US). Glued binding. 744 p. Contains: Unspecified, Illustrations, black & white, Figures., Berlin, Heidelberg, [PU: Springer]
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223)
EAN (ISBN-13): 9783642146220
ISBN (ISBN-10): 3642146228
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2010
Herausgeber: Rabin, Tal, Springer
744 Seiten
Gewicht: 1,064 kg
Sprache: eng/Englisch
Buch in der Datenbank seit 2009-09-07T09:34:27+02:00 (Berlin)
Detailseite zuletzt geändert am 2023-06-09T15:19:04+02:00 (Berlin)
ISBN/EAN: 9783642146220
ISBN - alternative Schreibweisen:
3-642-14622-8, 978-3-642-14622-0
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: tal, rabin lea, craig charles, charles barbara, ieee computer society
Titel des Buches: crypto 2010, advances cryptology, barbara, les crypto, advances computer security, lecture notes computer science, august santa
Daten vom Verlag:
Autor/in: Tal Rabin
Titel: Lecture Notes in Computer Science; Security and Cryptology; Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Verlag: Springer; Springer Berlin
744 Seiten
Erscheinungsjahr: 2010-07-30
Berlin; Heidelberg; DE
Gewicht: 1,145 kg
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XIV, 744 p. 63 illus.
BC; Cryptology; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Hashing; Internet; Permutation; algebraic geometry; authentication; block ciphers; collision resistance; complexity; cryptography; embedded systems; security; trust; Management of Computing and Information Systems; Computer Communication Networks; Systems and Data Security; Computers and Society; Discrete Mathematics in Computer Science; Cryptology; IT Operations; Computer Communication Networks; Data and Information Security; Computers and Society; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Mathematik für Informatiker; Diskrete Mathematik; EA
Leakage.- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability.- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.- Protecting Cryptographic Keys against Continual Leakage.- Securing Computation against Continuous Leakage.- Lattice.- An Efficient and Parallel Gaussian Sampler for Lattices.- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.- Homomorphic Encryption.- Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.- Additively Homomorphic Encryption with d-Operand Multiplications.- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.- Theory and Applications.- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.- Structure-Preserving Signatures and Commitments to Group Elements.- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.- Key Exchange, OAEP/RSA, CCA.- Credential Authenticated Identification and Key Exchange.- Password-Authenticated Session-Key Generation on the Internet in the Plain Model.- Instantiability of RSA-OAEP under Chosen-Plaintext Attack.- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.- Attacks.- Factorization of a 768-Bit RSA Modulus.- Correcting Errors in RSA Private Keys.- Improved Differential Attacks for ECHO and Grøstl.- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.- Composition.- Universally Composable Incoercibility.- Concurrent Non-Malleable Zero Knowledge Proofs.- Equivalence of Uniform Key Agreement and Composition Insecurity.- Computation Delegation and Obfuscation.- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.- Improved Delegation of Computation Using Fully Homomorphic Encryption.- Oblivious RAM Revisited.- On Strong Simulation and Composable Point Obfuscation.- Multiparty Computation.- Protocols for Multiparty Coin Toss with Dishonest Majority.- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.- Secure Multiparty Computation with Minimal Interaction.- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.- Pseudorandomness.- On Generalized Feistel Networks.- Cryptographic Extraction and Key Derivation: The HKDF Scheme.- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.- Quantum.- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.- Sampling in a Quantum Population, and Applications.Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783642146237 Advances in Cryptology -- CRYPTO 2010 (Springer)
< zum Archiv...