Автор: Jung Hee Cheon; Tsuyoshi Takagi Название: Advances in Cryptology -- ASIACRYPT 2016 ISBN: 366253889X ISBN-13(EAN): 9783662538890 Издательство: Springer Рейтинг: Цена: 15932.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Автор: Jung Hee Cheon; Tsuyoshi Takagi Название: Advances in Cryptology -- ASIACRYPT 2016 ISBN: 3662538865 ISBN-13(EAN): 9783662538869 Издательство: Springer Рейтинг: Цена: 14814.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set LNCS 10031 and LNCS 10032 constitutes the refereed proceedings of the 22nd International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2016, held in Hanoi, Vietnam, in December 2016. The 67 revised full papers and 2 invited talks presented were carefully selected from 240 submissions. They are organized in topical sections on Mathematical Analysis; AES and White-Box; Hash Function; Randomness; Authenticated Encryption; Block Cipher; SCA and Leakage Resilience; Zero Knowledge; Post Quantum Cryptography; Provable Security; Digital Signature; Functional and Homomorphic Cryptography; ABE and IBE; Foundation; Cryptographic Protocol; Multi-Party Computation.
Автор: Hideki Imai; Ronald L. Rivest; Tsutomu Matsumoto Название: Advances in Cryptology - ASIACRYPT `91 ISBN: 3540573321 ISBN-13(EAN): 9783540573326 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This volume contains the proceedings of an international conference regarding the theory and applications of cryptology. The conference was modelled on the CRYTO and EUROCRYPT series of conferences, sponsored by the International Association of Cryptologic Research (IACR).
Автор: Kwangjo Kim; Tsutomu Matsumoto Название: Advances in Cryptology - ASIACRYPT `96 ISBN: 3540618724 ISBN-13(EAN): 9783540618720 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: This work on cryptology covers: discrete log based systems; efficient algorithms; hash functions and block cyphers; cryptographic protocols; signature and identification; visual secret sharing; key distribution; Boolean functions; electronic cash; special signatures; and stream ciphers.
Автор: Mitsuri Matsui Название: Advances in Cryptology - ASIACRYPT 2009 ISBN: 3642103650 ISBN-13(EAN): 9783642103650 Издательство: Springer Рейтинг: Цена: 18167.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Includes the refereed proceedings of the 15th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2009, held in Tokyo, Japan, in December 2009. This title contains sections on block ciphers, quantum and post-quantum, hash functions I, encryption schemes, and multi party computation.
Автор: Kwok Yan Lam; Eiji Okamoto; Chaoping Xing Название: Advances in Cryptology - ASIACRYPT`99 ISBN: 3540666664 ISBN-13(EAN): 9783540666660 Издательство: Springer Рейтинг: Цена: 12157.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The proceedings of the 5th International Conference on the Theory and Application of Cryptology and Information Security (ASIACRYPT '99). Topics covered include assymetric key cryptosystems, cryptanalysis, elliptic curve cryptosystems, public key cryptosystems, and integers and computation.
Автор: Rosario Gennaro; Matthew Robshaw Название: Advances in Cryptology -- CRYPTO 2015 ISBN: 3662479885 ISBN-13(EAN): 9783662479889 Издательство: Springer Рейтинг: Цена: 12298.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The papers are organized in the following topical sections: lattice-based cryptography; hash functions and stream cipher cryptanalysis;
Автор: Rosario Gennaro; Matthew Robshaw Название: Advances in Cryptology -- CRYPTO 2015 ISBN: 3662479990 ISBN-13(EAN): 9783662479995 Издательство: Springer Рейтинг: Цена: 12298.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two volume-set, LNCS 9215 and LNCS 9216, constitutes the refereed proceedings of the 35th Annual International Cryptology Conference, CRYPTO 2015, held in Santa Barbara, CA, USA, in August 2015. The papers are organized in the following topical sections: lattice-based cryptography; hash functions and stream cipher cryptanalysis;
Название: Advances in cryptology -- asiacrypt 2015 ISBN: 3662487969 ISBN-13(EAN): 9783662487969 Издательство: Springer Рейтинг: Цена: 13416.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: The two-volume set LNCS 9452 and 9453 constitutes the refereed proceedings of the 21st International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT 2015, held in Auckland, New Zealand, in November/December 2015.
Автор: Josef Pawel Pieprzyk Название: Advances in Cryptology - ASIACRYPT 2008 ISBN: 3540892540 ISBN-13(EAN): 9783540892540 Издательство: Springer Рейтинг: Цена: 9636.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Constitutes the refereed proceedings of the 14th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2008, held in Melbourne, Australia. This book includes such topics as muliti-party computation, cryptographic protocols, cryptographic hash functions, and public-key cryptography.
Автор: Elisabeth Oswald; Marc Fischlin Название: Advances in Cryptology - EUROCRYPT 2015 ISBN: 3662468026 ISBN-13(EAN): 9783662468029 Издательство: Springer Рейтинг: Цена: 13416.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Universal Signature Aggregators.- Fully Structure-Preserving Signatures and Shrinking Commitments.- Disjunctions for Hash Proof Systems: New Constructions and Applications.- Quasi-Adaptive NIZK for Linear Subspaces Revisited.- Leakage-Resilient Circuits Revisited - Optimal Number of Computing Components Without Leak-Free Hardware.- Noisy Leakage .- Privacy-Free Garbled Circuits with Applications to Efficient Zero-Knowledge.- Two Halves Make a Whole: Reducing Data Transfer in Garbled Circuits Using Half Gates.- One-Out-of-Many Proofs: Or How to Leak a Secret and Spend a Coin.- The Bitcoin Backbone Protocol: Analysis and Applications.- Linear Secret Sharing Schemes from Error Correcting Codes.- Function Secret Sharing.- Cluster Computing in Zero Knowledge.- Hosting Services on an Untrusted Cloud.- How to Obfuscate Programs Directly.- Cryptographic Agents: Towards a Unified Theory of Computing on Encrypted Data.- Executable Proofs, Input-Size Hiding Secure Computation and a New Ideal World.- Semantically Secure Order-Revealing Encryption: Multi-input Functional Encryption Without Obfuscation.- Improved Dual System ABE in Prime-Order Groups via Predicate Encodings.- Resisting Randomness Subversion: Fast Deterministic and Hedged Public-Key Encryption in the Standard Model.- Cryptographic Reverse Firewalls.- Mind the Gap: Modular Machine-Checked Proofs of One-Round Key Exchange Protocols.- Authenticated Key Exchange from Ideal Lattices.- Non-Interactive Zero-Knowledge Proofs in the Quantum Random Oracle Model.- Privacy Amplification in the Isolated Qubits Model.- Generic Hardness of the Multiple Discrete Logarithm Problem.
Автор: Elisabeth Oswald; Marc Fischlin Название: Advances in Cryptology -- EUROCRYPT 2015 ISBN: 3662467992 ISBN-13(EAN): 9783662467992 Издательство: Springer Рейтинг: Цена: 13416.00 р. Наличие на складе: Есть у поставщика Поставка под заказ.
Описание: Cryptanalysis of the Multilinear Map over the Integers.- Robust Authenticated-Encryption AEZ and the Problem That It Solves.- On the Behaviors of Affine Equivalent Sboxes Regarding Differential and Linear Attacks.- A Provable-Security Analysis of Intel's Secure Key RNG.- A Formal Treatment of Backdoored Pseudorandom Generators.- Improving NFS for the Discrete Logarithm Problem in Non-prime Finite Fields.- The Multiple Number Field Sieve with Conjugation and Generalized.- Better Algorithms for LWE and LWR.- On Computing Nearest Neighbors with Applications to Decoding of Binary Linear Codes.- Cryptanalytic Time-Memory-Data Tradeoffs for FX-Constructions with Applications to PRINCE and PRIDE.- A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro.- Structural Evaluation by Generalized Integral Property.- Cryptanalysis of SP Networks with Partial Non-Linear Layers.- The Sum Can Be Weaker Than Each Part.- SPHINCS: Practical Stateless Hash-Based Signatures.- Making Masking Security Proofs Concrete: Or How to Evaluate the Security of Any Leaking Device.- Ciphers for MPC and FHE.- Verified Proofs of Higher-Order Masking.- Inner Product Masking Revisited.- Fully Homomophic Encryption over the Integers Revisited.- (Batch) Fully Homomorphic Encryption over Integers for Non-Binary Message Spaces .- KDM-CCA Security from RKA Secure Authenticated Encryption.- On the Provable Security of the Iterated Even-Mansour Cipher Against Related-Key and Chosen-Key Attacks.- FHEW: Bootstrapping Homomorphic Encryption in Less Than a Second.- Bootstrapping for HElib.- More Efficient Oblivious Transfer Extensions with Security for Malicious Adversaries.- How to Efficiently Evaluate RAM Programs with Malicious Security.- Cube Attacks and Cube-Attack-Like Cryptanalysis on the Round-Reduced Keccak Sponge Function.- Twisted Polynomials and Forgery Attacks on GCM.- Quadratic Time, Linear Space Algorithms for Gram-Schmidt Orthogonalization and Gaussian Sampling in Structured Lattices.
ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru