2013, ISBN: 9783642360947
This book constitutes the refereed proceedings of the Cryptographers'' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revise… Mehr…
Indigo.ca new in stock. Versandkosten:zzgl. Versandkosten. Details... |
2013, ISBN: 9783642360947
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised… Mehr…
Orellfuessli.ch Nr. A1027702474. Versandkosten:Lieferzeiten außerhalb der Schweiz 3 bis 21 Werktage, , Versandfertig innert 6 - 9 Werktagen, zzgl. Versandkosten. (EUR 17.52) Details... |
Topics in Cryptology - CT- RSA 2013 The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings - gebrauchtes Buch
2013, ISBN: 9783642360947
[PU: Springer Berlin], 23372590/1, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2013, Banküberweisung, Kreditkarte, PayPal, Klarna-Sofortüberweisung, Internationaler Versand
booklooker.de |
2013, ISBN: 3642360947
Topics in Cryptology - CT- RSA 2013 ab 66.49 € als Taschenbuch: The Cryptographer`s Track at RSA Conference 2013 San Francisco CA USA February 25- March 1 2013 Proceedings. Auflage 2013. … Mehr…
Hugendubel.de Nr. 20048599. Versandkosten:, , DE. (EUR 0.00) Details... |
2013, ISBN: 9783642360947
PRINT ISBN: 9783642360947 E-TEXT ISBN: 9783642360954 Springer Nature eBook Other pricing structure might be available at vitalsource.com., Springer
VitalSource.com new in stock Germany. Versandkosten:zzgl. Versandkosten. Details... |
2013, ISBN: 9783642360947
This book constitutes the refereed proceedings of the Cryptographers'' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revise… Mehr…
2013, ISBN: 9783642360947
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised… Mehr…
Topics in Cryptology - CT- RSA 2013 The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings - gebrauchtes Buch
2013
ISBN: 9783642360947
[PU: Springer Berlin], 23372590/1, DE, [SC: 0.00], gebraucht; sehr gut, gewerbliches Angebot, 2013, Banküberweisung, Kreditkarte, PayPal, Klarna-Sofortüberweisung, Internationaler Versand
2013, ISBN: 3642360947
Topics in Cryptology - CT- RSA 2013 ab 66.49 € als Taschenbuch: The Cryptographer`s Track at RSA Conference 2013 San Francisco CA USA February 25- March 1 2013 Proceedings. Auflage 2013. … Mehr…
2013, ISBN: 9783642360947
PRINT ISBN: 9783642360947 E-TEXT ISBN: 9783642360954 Springer Nature eBook Other pricing structure might be available at vitalsource.com., Springer
Bibliographische Daten des bestpassenden Buches
Autor: | |
Titel: | |
ISBN-Nummer: |
Detailangaben zum Buch - Topics in Cryptology - CT- RSA 2013 by Ed Dawson Paperback | Indigo Chapters
EAN (ISBN-13): 9783642360947
ISBN (ISBN-10): 3642360947
Gebundene Ausgabe
Taschenbuch
Erscheinungsjahr: 2013
Herausgeber: Ed Dawson
Buch in der Datenbank seit 2014-03-22T20:56:41+01:00 (Berlin)
Detailseite zuletzt geändert am 2024-01-24T15:10:39+01:00 (Berlin)
ISBN/EAN: 9783642360947
ISBN - alternative Schreibweisen:
3-642-36094-7, 978-3-642-36094-7
Alternative Schreibweisen und verwandte Suchbegriffe:
Autor des Buches: dawson
Titel des Buches: topic, crypto, san francisco, rsa
Daten vom Verlag:
Autor/in: Ed Dawson
Titel: Lecture Notes in Computer Science; Security and Cryptology; Topics in Cryptology - CT- RSA 2013 - The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings
Verlag: Springer; Springer Berlin
405 Seiten
Erscheinungsjahr: 2013-01-02
Berlin; Heidelberg; DE
Gedruckt / Hergestellt in Niederlande.
Sprache: Englisch
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
POD
XIV, 405 p. 68 illus.
BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; ciphertext; enterprise defense; hashing; information security; randomness; Cryptology; Data and Information Security; Operating Systems; e-Commerce and e-Business; Computer Communication Networks; Coding and Information Theory; Kryptografie, Verschlüsselungstechnologie; Computersicherheit; Netzwerksicherheit; Betriebssysteme; Computer-Anwendungen in den Sozial- und Verhaltenswissenschaften; E-Commerce: geschäftliche Aspekte; Netzwerk-Hardware; Informationstheorie; EA
Side Channel Attacks I.- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party.- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.- Public-Key Encryption I.- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.- Cryptographic Protocols I.- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.- Randomized Partial Checking Revisited.- Secure Implementation Methods.- Randomly Failed! The State of Randomness in Current Java Implementations.- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Grøstl.- Symmetric Key Primitives I.- Collisions for the WIDEA-8 Compression Function.- Finding Collisions for Round-Reduced SM3.- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures.- Side Channel Attacks II.- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.- Cryptographic Protocols II.- Cryptanalytic Attacks on MIFARE Classic Protocol.- Asynchronous Computational VSS with Reduced Communication Complexity.- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012.- Solving BDD by Enumeration: An Update.- Identity-Based Encryption.- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.- Accountable Authority Identity-Based Encryption with Public Traceability.- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.- Symmetric Key Primitives II.- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.- A FullyHomomorphic Cryptosystem with Approximate Perfect Secrecy.- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.Fast-track conference proceedings State-of-the-art research Up-to-date results
Weitere, andere Bücher, die diesem Buch sehr ähnlich sein könnten:
Neuestes ähnliches Buch:
9783642360954 Topics in Cryptology - CT- RSA 2013 (Ed Dawson)
- 9783642360954 Topics in Cryptology - CT- RSA 2013 (Ed Dawson)
- 9783319048512 Topics in Cryptology -- CT-RSA 2014 (Josh Benaloh)
- Topics in Cryptology - CT- RSA 2013: The Cryptographer`s Track at RSA Conference 2013, San Francisco, CA, USA, February 25- March 1, 2013, Proceedings (Lecture Notes in Computer Science) (2012-12-21) (Kaisa Nyberg)
< zum Archiv...