2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … More...
amazon.de DMI Media Europe Gebraucht, wie neu. Shipping costs:Gewöhnlich versandfertig in 6 bis 7 Tagen. Les coûts d'expédition peuvent différer des coûts réels. (EUR 3.00) Details... |
2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … More...
amazon.de Shipping costs:Les coûts d'expédition peuvent différer des coûts réels. (EUR 3.00) Details... |
Advances in Cryptologycrypto 2010 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 1519, 2010, Proceedings 6223 Lecture Notes in Computer Science - Paperback
2007, ISBN: 9783642146220
Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… More...
alibris.co.uk |
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings - Paperback
2010, ISBN: 9783642146220
Trade paperback, New., Trade paperback (US). Glued binding. 744 p. Contains: Unspecified, Illustrations, black & white, Figures., Berlin, Heidelberg, [PU: Springer]
alibris.co.uk |
Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - Paperback
2010, ISBN: 3642146228
[EAN: 9783642146220], New book, [SC: 6.99], [PU: Springer-Verlag New York Inc], 744 pages. 9.00x6.00x1.25 inches. In Stock., Books
AbeBooks.co.uk Revaluation Books, Exeter, United Kingdom [2134736] [Rating: 5 (of 5)] NEW BOOK. Shipping costs: EUR 6.99 Details... |
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223) - Paperback
2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … More...
2010, ISBN: 9783642146220
Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … More...
Advances in Cryptologycrypto 2010 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 1519, 2010, Proceedings 6223 Lecture Notes in Computer Science - Paperback
2007
ISBN: 9783642146220
Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… More...
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings - Paperback
2010, ISBN: 9783642146220
Trade paperback, New., Trade paperback (US). Glued binding. 744 p. Contains: Unspecified, Illustrations, black & white, Figures., Berlin, Heidelberg, [PU: Springer]
Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - Paperback
2010, ISBN: 3642146228
[EAN: 9783642146220], New book, [SC: 6.99], [PU: Springer-Verlag New York Inc], 744 pages. 9.00x6.00x1.25 inches. In Stock., Books
Bibliographic data of the best matching book
Author: | |
Title: | |
ISBN: |
Details of the book - Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223)
EAN (ISBN-13): 9783642146220
ISBN (ISBN-10): 3642146228
Hardcover
Paperback
Publishing year: 2010
Publisher: Rabin, Tal, Springer
744 Pages
Weight: 1,064 kg
Language: eng/Englisch
Book in our database since 2009-09-07T08:34:27+01:00 (London)
Detail page last modified on 2023-06-09T14:19:04+01:00 (London)
ISBN/EAN: 3642146228
ISBN - alternate spelling:
3-642-14622-8, 978-3-642-14622-0
Alternate spelling and related search-keywords:
Book author: tal, rabin lea, craig charles, charles barbara, ieee computer society
Book title: crypto 2010, advances cryptology, barbara, les crypto, advances computer security, lecture notes computer science, august santa
Information from Publisher
Author: Tal Rabin
Title: Security and Cryptology; Lecture Notes in Computer Science; Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Publisher: Springer; Springer Berlin
744 Pages
Publishing year: 2010-07-30
Berlin; Heidelberg; DE
Language: English
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 744 p. 63 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Hashing; Internet; Permutation; algebraic geometry; authentication; block ciphers; collision resistance; complexity; cryptography; embedded systems; security; trust; Cryptology; IT Operations; Computer Communication Networks; Data and Information Security; Computers and Society; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Mathematik für Informatiker; Diskrete Mathematik; EA
Leakage.- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability.- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.- Protecting Cryptographic Keys against Continual Leakage.- Securing Computation against Continuous Leakage.- Lattice.- An Efficient and Parallel Gaussian Sampler for Lattices.- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.- Homomorphic Encryption.- Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.- Additively Homomorphic Encryption with d-Operand Multiplications.- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.- Theory and Applications.- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.- Structure-Preserving Signatures and Commitments to Group Elements.- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.- Key Exchange, OAEP/RSA, CCA.- Credential Authenticated Identification and Key Exchange.- Password-Authenticated Session-Key Generation on the Internet in the Plain Model.- Instantiability of RSA-OAEP under Chosen-Plaintext Attack.- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.- Attacks.- Factorization of a 768-Bit RSA Modulus.- Correcting Errors in RSA Private Keys.- Improved Differential Attacks for ECHO and Grøstl.- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.- Composition.- Universally Composable Incoercibility.- Concurrent Non-Malleable Zero Knowledge Proofs.- Equivalence of Uniform Key Agreement and Composition Insecurity.- Computation Delegation and Obfuscation.- Non-interactive Verifiable Computing:Outsourcing Computation to Untrusted Workers.- Improved Delegation of Computation Using Fully Homomorphic Encryption.- Oblivious RAM Revisited.- On Strong Simulation and Composable Point Obfuscation.- Multiparty Computation.- Protocols for Multiparty Coin Toss with Dishonest Majority.- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.- Secure Multiparty Computation with Minimal Interaction.- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.- Pseudorandomness.- On Generalized Feistel Networks.- Cryptographic Extraction and Key Derivation: The HKDF Scheme.- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.- Quantum.- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.- Sampling in a Quantum Population, and Applications.Up-to-date research in cryptology
More/other books that might be very similar to this book
Latest similar book:
9783642146237 Advances in Cryptology -- CRYPTO 2010 (Springer)
- 9783642146237 Advances in Cryptology -- CRYPTO 2010 (Springer)
- 9783662480007 Advances in Cryptology -- CRYPTO 2015: 35th Annual Cryptology Conference, Santa Barbara, CA, USA, August 16-20, 2015, Proceedings, Part II Rosario Gen (Springer)
- 9783642146244 Advances in Cryptology -- Crypto 2010 (Tal Rabin)
- 9783642227912 Advances in Cryptology -- CRYPTO 2011 (Phillip Rogaway)
< to archive...