
2010, ISBN: 3642146228
Titel: Advances in Cryptology -- CRYPTO 2010 | Zusatz: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings | Medium: Taschenbuch | Redaktion: Tal Ra… More...
| ebay.de faboplay 99.8, Zahlungsarten: Andere, Bar, Paypal, APPLE_PAY, Kreditkarte, Visa, Mastercard, American Express, Priority Listing. Shipping costs:Versand zum Fixpreis, [SHT: Standardversand], 49*** Dissen a.T.W. [TO: Deutschland] (EUR 2.95) Details... |

Advances in Cryptology -- CRYPTO 2010 : 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings - Paperback
2010, ISBN: 3642146228
[EAN: 9783642146220], Neubuch, [SC: 0.0], [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer], AES, HASHING, INTERNET, PERMUTATION, ALGEBRAIC GEOMETRY, AUTHENTICATION, BLOCK CIPH… More...
| ZVAB.com AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Shipping costs:Versandkostenfrei. (EUR 0.00) Details... |

Advances in Cryptology -- CRYPTO 2010 : 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings - Paperback
2010, ISBN: 3642146228
[EAN: 9783642146220], Neubuch, [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer], AES, HASHING, INTERNET, PERMUTATION, ALGEBRAIC GEOMETRY, AUTHENTICATION, BLOCK CIPHERS, COLLIS… More...
| AbeBooks.de AHA-BUCH GmbH, Einbeck, Germany [51283250] [Rating: 5 (von 5)] NEW BOOK. Shipping costs:Versandkostenfrei. (EUR 0.00) Details... |

2010, ISBN: 3642146228
[EAN: 9783642146220], Neubuch, [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer Jul 2010], AES, HASHING, INTERNET, PERMUTATION, ALGEBRAIC GEOMETRY, AUTHENTICATION, BLOCK CIPHER… More...
| AbeBooks.de BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Germany [57449362] [Rating: 5 (von 5)] NEW BOOK. Shipping costs:Versandkostenfrei. (EUR 0.00) Details... |

2010, ISBN: 9783642146220
[ED: Taschenbuch], [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer], Neuware - CRYPTO2010,the30thAnnualInternationalCryptologyConference,wassp- sored by the International Asso… More...
| booklooker.de BuchWeltWeit Inh. Ludwig Meier e.K. Shipping costs:Versandkostenfrei, Versand nach Deutschland. (EUR 0.00) Details... |


2010, ISBN: 3642146228
Titel: Advances in Cryptology -- CRYPTO 2010 | Zusatz: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings | Medium: Taschenbuch | Redaktion: Tal Ra… More...

Tal Rabin:
Advances in Cryptology -- CRYPTO 2010 : 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings - Paperback2010, ISBN: 3642146228
[EAN: 9783642146220], Neubuch, [SC: 0.0], [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer], AES, HASHING, INTERNET, PERMUTATION, ALGEBRAIC GEOMETRY, AUTHENTICATION, BLOCK CIPH… More...

Advances in Cryptology -- CRYPTO 2010 : 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings - Paperback
2010
ISBN: 3642146228
[EAN: 9783642146220], Neubuch, [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer], AES, HASHING, INTERNET, PERMUTATION, ALGEBRAIC GEOMETRY, AUTHENTICATION, BLOCK CIPHERS, COLLIS… More...

2010, ISBN: 3642146228
[EAN: 9783642146220], Neubuch, [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer Jul 2010], AES, HASHING, INTERNET, PERMUTATION, ALGEBRAIC GEOMETRY, AUTHENTICATION, BLOCK CIPHER… More...
2010, ISBN: 9783642146220
[ED: Taschenbuch], [PU: Springer, Berlin, Springer Berlin Heidelberg, Springer], Neuware - CRYPTO2010,the30thAnnualInternationalCryptologyConference,wassp- sored by the International Asso… More...
Bibliographic data of the best matching book
| Author: | |
| Title: | |
| ISBN: |
Details of the book - Advances in Cryptology -- CRYPTO 2010
EAN (ISBN-13): 9783642146220
ISBN (ISBN-10): 3642146228
Hardcover
Paperback
Publishing year: 2010
Publisher: Springer Berlin
744 Pages
Weight: 1,064 kg
Language: eng/Englisch
Book in our database since 2009-09-07T08:34:27+01:00 (London)
Book found last time on 2026-02-25T23:04:15+00:00 (London)
ISBN/EAN: 9783642146220
ISBN - alternate spelling:
3-642-14622-8, 978-3-642-14622-0
Alternate spelling and related search-keywords:
Book author: tal, rabin lea, craig charles, charles barbara, ieee computer society
Book title: crypto 2010, advances cryptology, barbara, les crypto, advances computer security, lecture notes computer science, august santa
Information from Publisher
Author: Tal Rabin
Title: Security and Cryptology; Lecture Notes in Computer Science; Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Publisher: Springer; Springer Berlin
744 Pages
Publishing year: 2010-07-30
Berlin; Heidelberg; DE
Language: English
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 744 p. 63 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Hashing; Internet; Permutation; algebraic geometry; authentication; block ciphers; collision resistance; complexity; cryptography; embedded systems; security; trust; Cryptology; IT Operations; Computer Communication Networks; Data and Information Security; Computers and Society; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Mathematik für Informatiker; Diskrete Mathematik; EA
Leakage.- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability.- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.- Protecting Cryptographic Keys against Continual Leakage.- Securing Computation against Continuous Leakage.- Lattice.- An Efficient and Parallel Gaussian Sampler for Lattices.- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.- Homomorphic Encryption.- Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.- Additively Homomorphic Encryption with d-Operand Multiplications.- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.- Theory and Applications.- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.- Structure-Preserving Signatures and Commitments to Group Elements.- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.- Key Exchange, OAEP/RSA, CCA.- Credential Authenticated Identification and Key Exchange.- Password-Authenticated Session-Key Generation on the Internet in the Plain Model.- Instantiability of RSA-OAEP under Chosen-Plaintext Attack.- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.- Attacks.- Factorization of a 768-Bit RSA Modulus.- Correcting Errors in RSA Private Keys.- Improved Differential Attacks for ECHO and Grøstl.- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.- Composition.- Universally Composable Incoercibility.- Concurrent Non-Malleable Zero Knowledge Proofs.- Equivalence of Uniform Key Agreement and Composition Insecurity.- Computation Delegation and Obfuscation.- Non-interactive Verifiable Computing:Outsourcing Computation to Untrusted Workers.- Improved Delegation of Computation Using Fully Homomorphic Encryption.- Oblivious RAM Revisited.- On Strong Simulation and Composable Point Obfuscation.- Multiparty Computation.- Protocols for Multiparty Coin Toss with Dishonest Majority.- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.- Secure Multiparty Computation with Minimal Interaction.- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.- Pseudorandomness.- On Generalized Feistel Networks.- Cryptographic Extraction and Key Derivation: The HKDF Scheme.- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.- Quantum.- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.- Sampling in a Quantum Population, and Applications.Up-to-date research in cryptology
More/other books that might be very similar to this book
Latest similar book:
9783642146237 Advances in Cryptology -- CRYPTO 2010 (Tal Rabin)
- 9783642146237 Advances in Cryptology -- CRYPTO 2010 (Tal Rabin)
- 9783662480007 Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II Rosario Gen (Springer)
- 9783642146244 Advances in Cryptology -- Crypto 2010 (Tal Rabin)
< to archive...
