- 5 Results
Lowest price: € 39.58, highest price: € 50.49, average price: € 44.98
1
Order
at lehmanns.de
€ 49.98
Shipment: € 0.001
OrderSponsored link
Thomas Beth; Norbert Cot; Ingemar Ingemarsson:

Advances in Cryptology - new book

2007, ISBN: 9783540397571

Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984, eBooks, eBook Download (PDF), [PU: Springer Berlin Hei… More...

Shipping costs:Download sofort lieferbar. (EUR 0.00)
2
Advances in Cryptology
Order
at eBook.de
€ 50.49
Shipment: € 0.001
OrderSponsored link
Advances in Cryptology - new book

ISBN: 9783540397571

Advances in Cryptology - Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris France April 9-11 1984: ab 50.49 € eBooks > Sachthemen &… More...

Shipping costs:in stock, , , DE. (EUR 0.00)
3
Advances in Cryptology : Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984 - Jian-Yi Shi
Order
at hive.co.uk
£ 36.54
(aprox. € 41.61)
OrderSponsored link
Jian-Yi Shi:
Advances in Cryptology : Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984 - new book

ISBN: 9783540397571

; PDF; Reference > Research & information: general > Coding theory & cryptology, Springer Berlin Heidelberg

No. 9783540397571. Shipping costs:Instock, Despatched same working day before 3pm, zzgl. Versandkosten., plus shipping costs
4
Advances in Cryptology : Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984 - David P. Landau
Order
at hive.co.uk
£ 36.55
(aprox. € 43.23)
OrderSponsored link
David P. Landau:
Advances in Cryptology : Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984 - new book

ISBN: 9783540397571

; PDF; Computing > Computer security > Data encryption, Springer Berlin Heidelberg

No. 9783540397571. Shipping costs:Instock, Despatched same working day before 3pm, zzgl. Versandkosten., plus shipping costs
5
Advances in Cryptology - Thomas Beth; Norbert Cot; Ingemar Ingemarsson
Order
at Springer.com
€ 39.58
Shipment: € 0.001
OrderSponsored link
Thomas Beth; Norbert Cot; Ingemar Ingemarsson:
Advances in Cryptology - new book

ISBN: 9783540397571

There is currently no description available Books > Computer Science eBook, Springer Shop

new in stock. Shipping costs:zzgl. Versandkosten. (EUR 0.00)

1As some platforms do not transmit shipping conditions to us and these may depend on the country of delivery, the purchase price, the weight and size of the item, a possible membership of the platform, a direct delivery by the platform or via a third-party provider (Marketplace), etc., it is possible that the shipping costs indicated by euro-book.co.uk / euro-book.co.uk do not correspond to those of the offering platform.

Bibliographic data of the best matching book

Details of the book

Details of the book - Advances in Cryptology


EAN (ISBN-13): 9783540397571
Publishing year: 2007
Publisher: Springer Berlin Heidelberg

Book in our database since 2017-04-25T07:29:05+01:00 (London)
Detail page last modified on 2023-03-29T15:39:16+01:00 (London)
ISBN/EAN: 9783540397571

ISBN - alternate spelling:
978-3-540-39757-1
Alternate spelling and related search-keywords:
Book author: david landau, beth thomas
Book title: 1984, workshop techniques, april paris


Information from Publisher

Author: Thomas Beth; Norbert Cot; Ingemar Ingemarsson
Title: Lecture Notes in Computer Science; Advances in Cryptology - Proceedings of EUROCRYPT 84. A Workshop on the Theory and Application of Cryptographic Techniques - Paris, France, April 9-11, 1984
Publisher: Springer; Springer Berlin
494 Pages
Publishing year: 2007-03-05
Berlin; Heidelberg; DE
Language: English
50,28 € (DE)
51,70 € (AT)
63,00 CHF (CH)
Available
X, 494 p.

EA; E107; eBook; Nonbooks, PBS / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; algorithms; communication; complexity; computer; computer science; cryptoanalysis; cryptology; cryptosystems; digital signature; encryption; finite field; networks; privacy; C; Cryptology; Coding and Information Theory; Computer Science; Kryptografie, Verschlüsselungstechnologie; Informationstheorie; BC

General Theory, Classical Methods.- Cryptology and Complexity Theories.- On Cryptosystems Based on Polynomials and Finite Fields.- Algebraical Structures of Cryptographic Transformations.- Non Linear Non Commutative Functions for Data Integrity.- Wire-Tap Channel II.- Equivocations for Homophonic Ciphers.- Propagation Characteristics of the DES.- Linear Ciphers and Random Sequence Generators with Multiple Clocks.- The Stop-and-Go-Generator.- Pseudo Random Properties of Cascade Connections of Clock Controlled Shift Registers.- On the linear complexity of cascaded sequences.- Public-Key Systems.- RSA-bits are 0.5 + ? secure.- On the Number of Close-and-Equal Pairs of Bits in a String (with Implications on the Security of RSA’s L.S.B) (Extended Abstract).- Fast Cryptanalysis of the Matsumoto-Imai Public Key Scheme.- A New Trapdoor Knapsack Public Key Cryptosystem.- RSA Chips (Past/Present/Future) (Extended abstract).- Number Theoretical Papers.- The Quadratic Sieve Factoring Algorithm.- Status Report on Factoring (At the Sandia National Laboratories).- Strong Primes are Easy to Find.- Discrete logarithms in finite fields and their cryptographic significance.- Channels, Networks, Key Distribution, Protocols.- User Functions for the Generation and Distribution of Encipherment Keys.- An Optimal Class of Symmetric Key Generation Systems.- On the Use of the Binary Multiplying Channel in a Private Communication System.- Secrecy and Privacy in a Local Area Network Environment.- The Subliminal Channel and Digital Signatures.- A Provably Secure Oblivious Transfer Protocol.- On Concurrent Identification Protocols (Extended Abstract).- Applications.- Time-Division Multiplexing Scramblers: Selecting Permutations and Testing the System.- Security of Transportable ComputerizedFiles.- Encryption and Key Management for the ECS Statellite Service.- An Encryption and Authentification Procedure for Telesurveillance Systems.- A Method of Software Protection Based on the Use of Smart Cards and Cryptographic Techniques.- Smart Cards.- Session on Smart Cards Tuesday April 10.- Smart Card Applications in Security and Data Protection.- Bull CP8 Smart Card Uses in Cryptology.- Estimation of some Encryption Functions Implemented into Smart Cards.- Smart Cards and Conditional Access.

More/other books that might be very similar to this book

Latest similar book:
9780387576008 Advances in Cryptology-Eurocrypt '93: Workshop on the Theory and Application of Cryptographic Techniques Lofthus, Norway, May 23-27, 1993 : Proceedi (Lecture Notes in Computer Science) (Unknown)


< to archive...