Progress in Cryptology - AFRICACRYPT 2010 (eBook, PDF)
Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings
Redaktion: Bernstein, Daniel J.; Lange, Tanja
40,95 €
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
40,95 €
Als Download kaufen
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
20 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
40,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
20 °P sammeln
Progress in Cryptology - AFRICACRYPT 2010 (eBook, PDF)
Third International Conference on Cryptology in Africa, Stellenbosch, South Africa, May 3-6, 2010, Proceedings
Redaktion: Bernstein, Daniel J.; Lange, Tanja
- Format: PDF
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
- Geräte: PC
- ohne Kopierschutz
- eBook Hilfe
- Größe: 7.85MB
Andere Kunden interessierten sich auch für
- Advances in Cryptology - EUROCRYPT 2010 (eBook, PDF)40,95 €
- Progress in Cryptology -- AFRICACRYPT 2009 (eBook, PDF)40,95 €
- Topics in Cryptology - CT-RSA 2010 (eBook, PDF)40,95 €
- Progress in Cryptology - AFRICACRYPT 2008 (eBook, PDF)40,95 €
- Post-Quantum Cryptography (eBook, PDF)48,95 €
- Progress in Cryptology - INDOCRYPT 2007 (eBook, PDF)40,95 €
- Information Security Applications (eBook, PDF)40,95 €
-
-
-
Produktdetails
- Verlag: Springer Berlin Heidelberg
- Seitenzahl: 437
- Erscheinungstermin: 29. April 2010
- Englisch
- ISBN-13: 9783642126789
- Artikelnr.: 44133650
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Daniel J. Bernstein is a research professor in the Department of Computer Science at the University of Illinois at Chicago. Professor Bernstein has received a U.S. NationalScience Foundation CAREER award, a Cyber Trust award, three more U.S.government grants, and a Sloan Research Fellowship for his research in computational number theory, cryptography, and computer security. He is the author of several dozen papers and two of the Internet's most popular server software packages, djbdns and qmail.
Signatures.- A New RSA-Based Signature Scheme.- Fair Blind Signatures without Random Oracles.- Fair Partially Blind Signatures.- Attacks.- Parallel Shortest Lattice Vector Enumeration on Graphics Cards.- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over .- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.- Protocols.- Proofs of Restricted Shuffles.- Batch Range Proof for Practical Small Ranges.- Optimistic Fair Priced Oblivious Transfer.- Networks.- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.- Elliptic Curves.- Avoiding Full Extension Field Arithmetic in Pairing Computations.- ECC2K-130 on Cell CPUs.- Side-Channel Attacks and Fault Attacks.- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator.- Differential Fault Analysis of HC-128.- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.- Public-Key Encryption.- Strong Cryptography from Weak Secrets.- Efficient Unidirectional Proxy Re-Encryption.- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.- Keys and PUFs.- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.- Quantum Readout of Physical Unclonable Functions.- Ciphers and Hash Functions.- Parallelizing the Camellia and SMS4 Block Ciphers.- Improved Linear Differential Attacks on CubeHash.- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.
Signatures.- A New RSA-Based Signature Scheme.- Fair Blind Signatures without Random Oracles.- Fair Partially Blind Signatures.- Attacks.- Parallel Shortest Lattice Vector Enumeration on Graphics Cards.- Flexible Partial Enlargement to Accelerate Gröbner Basis Computation over .- Factoring RSA Modulus Using Prime Reconstruction from Random Known Bits.- Protocols.- Proofs of Restricted Shuffles.- Batch Range Proof for Practical Small Ranges.- Optimistic Fair Priced Oblivious Transfer.- Networks.- Information-Theoretically Secure Key-Insulated Multireceiver Authentication Codes.- Simple and Communication Complexity Efficient Almost Secure and Perfectly Secure Message Transmission Schemes.- Communication Efficient Perfectly Secure VSS and MPC in Asynchronous Networks with Optimal Resilience.- Elliptic Curves.- Avoiding Full Extension Field Arithmetic in Pairing Computations.- ECC2K-130 on Cell CPUs.- Side-Channel Attacks and Fault Attacks.- Practical Improvements of Profiled Side-Channel Attacks on a Hardware Crypto-Accelerator.- Differential Fault Analysis of HC-128.- Fresh Re-keying: Security against Side-Channel and Fault Attacks for Low-Cost Devices.- Public-Key Encryption.- Strong Cryptography from Weak Secrets.- Efficient Unidirectional Proxy Re-Encryption.- Public-Key Encryption with Non-Interactive Opening: New Constructions and Stronger Definitions.- Keys and PUFs.- Flexible Group Key Exchange with On-demand Computation of Subgroup Keys.- Quantum Readout of Physical Unclonable Functions.- Ciphers and Hash Functions.- Parallelizing the Camellia and SMS4 Block Ciphers.- Improved Linear Differential Attacks on CubeHash.- Cryptanalysis of the 10-Round Hash and Full Compression Function of SHAvite-3-512.