Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Pseudorandomness and Cryptographic Applications, Michael Luby


Варианты приобретения
Цена: 13939.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-08-04
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Michael Luby
Название:  Pseudorandomness and Cryptographic Applications
ISBN: 9780691025469
Издательство: Wiley
Классификация:

ISBN-10: 0691025460
Обложка/Формат: Paperback
Страницы: 248
Вес: 0.37 кг.
Дата издания: 28.01.1996
Серия: Princeton computer science notes
Язык: English
Размер: 23.37 x 15.44 x 1.78 cm
Читательская аудитория: Tertiary education (us: college)
Ссылка на Издательство: Link
Рейтинг:
Поставляется из: Англии
Описание: A study of the pseudo-random generator, a basic primitive in crytography which is useful for constructing a private key cryptosystem that is secure against chosen plaintext attack. The author stresses rigorous definitions and proofs related to private key cryptography.


Cryptographic Applications of Analytic Number Theory / Complexity Lower Bounds and Pseudorandomness

Автор: Shparlinski Igor
Название: Cryptographic Applications of Analytic Number Theory / Complexity Lower Bounds and Pseudorandomness
ISBN: 3764366540 ISBN-13(EAN): 9783764366544
Издательство: Springer
Рейтинг:
Цена: 15372.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The book introduces new ways of using analytic number theory in cryptography and related areas, such as complexity theory and pseudorandom number generation.Cryptographers and number theorists will find this book useful. The former can learn about new number theoretic techniques which have proved to be invaluable cryptographic tools, the latter about new challenging areas of applications of their skills.

Modern Cryptography, Probabilistic Proofs and Pseudorandomness

Автор: Oded Goldreich
Название: Modern Cryptography, Probabilistic Proofs and Pseudorandomness
ISBN: 354064766X ISBN-13(EAN): 9783540647669
Издательство: Springer
Рейтинг:
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This text focuses on three related areas in the theory of computation. The areas are modern cryptography, the study of probabilistic proof systems, and the theory of computational pseudorandomness. The common theme is the interplay between randomness and computation.

Modern Cryptography, Probabilistic Proofs and Pseudorandomness

Автор: Oded Goldreich
Название: Modern Cryptography, Probabilistic Proofs and Pseudorandomness
ISBN: 364208432X ISBN-13(EAN): 9783642084324
Издательство: Springer
Рейтинг:
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Cryptography is one of the most active areas in current mathematics research and applications. This book focuses on cryptography along with two related areas: the study of probabilistic proof systems, and the theory of computational pseudorandomness.

Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa

Автор: Canteaut Anne, Standaert Franзois-Xavier
Название: Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa
ISBN: 3030778827 ISBN-13(EAN): 9783030778828
Издательство: Springer
Цена: 12577.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Garbled Circuits.- LogStack: Stacked Garbling with O(b log b) Computation.- Large Scale, Actively Secure Computation from LPN and Free-XOR Garbled Circuits.- Threshold Garbled Circuits and Ad Hoc Secure Computation.- Indistinguishability Obfuscation.- Indistinguishability Obfuscation from Simple-to-State Hard Problems: New Assumptions, New Techniques, and Simplification.- Candidate Obfuscation via Oblivious LWE Sampling.- Non-Malleable Commitments.- Black-Box Non-Interactive Non-Malleable Commitments.- Non-interactive Distributional Indistinguishability (NIDI) and Non-Malleable Commitments.- Zero-Knowledge Proofs.- Public-Coin Statistical Zero-Knowledge Batch Verification against Malicious Verifiers.- Efficient Range Proofs with Transparent Setup from Bounded Integer Commitments.- Towards Accountability in CRS Generation.- Property-Preserving Hash Functions and ORAM.- Robust Property-Preserving Hash Functions for Hamming Distance and More.- Alibi: A Flaw in Cuckoo-Hashing based Hierarchical ORAM Schemes and a Solution.- Structured Encryption and Dynamic Leakage Suppression.- Blockchain.- Dynamic Ad Hoc Clock Synchronization.- TARDIS: A Foundation of Time-Lock Puzzles in UC.- Privacy and Law Enforcement.- On the power of multiple anonymous messages: Frequency Estimation and Selection in the Shuffle Model of Differential Privacy.- Non-Interactive Anonymous Router.- "Bifurcated Cryptography" Folding Competing Cryptosystems into a Single Scheme: On Accountability vs. Anonymity in Private Signatures.- Abuse Resistant Law Enforcement Access Systems.

Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa

Автор: Canteaut Anne, Standaert Franзois-Xavier
Название: Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa
ISBN: 303077869X ISBN-13(EAN): 9783030778699
Издательство: Springer
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Non-Interactive Zero Knowledge from Sub-exponential DDH.- On the (in)security of ROS.- New Representations of the AES Key Schedule.- Public-Key Cryptography.- Analysing the HPKE Standard.- Tightly-Secure Authenticated Key Exchange, Revisited.- Aggregatable Distributed Key Generation.- Decentralized Multi-Authority ABE for DNFs from LWE.- Isogenies.- Compact, Efficient and UC-Secure Isogeny-Based Oblivious Transfer.- One-way functions and malleability oracles: Hidden shift attacks on isogenybased protocols.- Sieving for twin smooth integers with solutions to the Prouhet-Tarry-Escott problem.- Delay Encryption.- Post-Quantum Cryptography.- The Nested Subset Differential Attack: A Practical Direct Attack Against LUOV which Forges a Signature within 210 Minutes.- Improved cryptanalysis of UOV and Rainbow.- Cryptanalytic Applications of the Polynomial Method for Solving Multivariate Equation Systems over GF(2).- Round-Optimal Blind Signatures in the Plain Model from Classical and Quantum Standard Assumptions.- Post-Quantum Multi-Party Computation.- Lattices.- A 2ⁿ/ -Time Algorithm for √n-SVP and √n-Hermite SVP, and an Improved Time-Approximation Tradeoff for (H)SVP.- New Lattice Two-Stage Sampling Technique and its Applications to Functional Encryption - Stronger Security and Smaller Ciphertexts.- On Bounded Distance Decoding with Predicate: Breaking the "Lattice Barrier" for the Hidden Number Problem.- On the ideal shortest vector problem over random rational primes.- Homomorphic Encryption.- Efficient Bootstrapping for Approximate Homomorphic Encryption with Non-Sparse Keys.- High-Precision Bootstrapping of RNS-CKKS Homomorphic Encryption Using Optimal Minimax Polynomial Approximation and Inverse Sine Function.- On the Security of Homomorphic Encryption on Approximate Numbers.- The Rise of Paillier: Homomorphic Secret Sharing and Public-Key Silent OT.- Symmetric Cryptanalysis.- Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha.- Rotational Cryptanalysis From a Differential-Linear Perspective - Practical Distinguishers for Round-reduced FRIET, Xoodoo, and Alzette.- Automatic Search of Meet-in-the-Middle Preimage Attacks on AES-like Hashing.- A Deeper Look at Machine Learning-Based Cryptanalysis.

Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa

Автор: Canteaut Anne, Standaert Franзois-Xavier
Название: Advances in Cryptology - Eurocrypt 2021: 40th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Zagreb, Croa
ISBN: 3030778851 ISBN-13(EAN): 9783030778859
Издательство: Springer
Цена: 18167.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Symmetric Designs.- Ciminion: Symmetric Encryption Based on Toffoli-Gates over Large Finite Fields.- Mind the Middle Layer: The HADES Design Strategy Revisited.- Password Hashing and Preprocessing.- Compactness of Hashing Modes and Efficiency beyond Merkle Tree.- Real-World Cryptanalysis.- Three Third Generation Attacks on the Format Preserving Encryption Scheme FF3.- Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2.- Implementation Issues.- Pre-Computation Scheme of Window NAF for Koblitz Curves Revisited.- Dummy Shuffling against Algebraic Attacks in White-box Implementations.- Advanced Lattice Sieving on GPUs, with Tensor Cores.- Masking and Secret-Sharing.- Fast verification of masking schemes in characteristic two.- On the Power of Expansion: More Efficient Constructions in the Random Probing Model.- Leakage-resilience of the Shamir Secret-sharing Scheme against Physicalbit Leakages.- Leakage, Faults and Tampering.- Leakage Resilient Value Comparison With Application to Message Authentication.- The Mother of All Leakages: How to Simulate Noisy Leakages via Bounded Leakage (Almost) for Free.- Message-recovery Laser Fault Injection Attack on the Classic McEliece Cryptosystem.- Multi-Source Non-Malleable Extractors and Applications.- Quantum Constructions and Proofs.- Secure Software Leasing.- Oblivious Transfer is in MiniQCrypt.- Security Analysis of Quantum Lightning.- Classical vs Quantum Random Oracles.- On the Compressed-Oracle Technique, and Post-Quantum Security of Proofs of Sequential Work.- Classical proofs of quantum knowledge.- Multiparty Computation.- Order-C Secure Multiparty Computation for Highly Repetitive Circuits.- The More The Merrier: Reducing the Cost of Large Scale MPC.- Multi-Party Reusable Non-Interactive Secure Computation from LWE.- Unbounded Multi-Party Computation from Learning with Errors.- Generic Compiler for Publicly Verifiable Covert Multi-Party Computation.- Constant-Overhead Unconditionally Secure Multiparty Computation over Binary Fields.- Breaking the Circuit Size Barrier for Secure Computation under Quasi-Polynomial LPN.- Function Secret Sharing for Mixed-Mode and Fixed-Point Secure Computation.- VOLE-PSI: Fast OPRF and Circuit-PSI from Vector-OLE.

Construction and Analysis of Cryptographic Functions

Автор: Lilya Budaghyan
Название: Construction and Analysis of Cryptographic Functions
ISBN: 3319363581 ISBN-13(EAN): 9783319363585
Издательство: Springer
Рейтинг:
Цена: 9781.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book covers novel research on construction and analysis of optimal cryptographic functions such as almost perfect nonlinear (APN), almost bent (AB), planar and bent functions.

Cryptographic Methods

Автор: Razaque Abdul, Amsaad Fathi, Alajlan Abrar
Название: Cryptographic Methods
ISBN: 1973694093 ISBN-13(EAN): 9781973694090
Издательство: Неизвестно
Рейтинг:
Цена: 9566.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This textbook provides a piece of adequate information about cryptographic methods, which are of paramount significance for the cyberspace world. It involves the state-of-the-art cryptographic algorithms that are either being used commercially or become standard. This book is about building the influential concept of the learners to identify the significance of those cryptographic algorithms. It is highly useful in conducting the hands of experience. This book is designed for a wide range of individuals who are highly intrigued to improve their knowledge as a cybersecurity professional.

Advances in Cryptology - Eurocrypt 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Is

Автор: Nielsen Jesper Buus, Rijmen Vincent
Название: Advances in Cryptology - Eurocrypt 2018: 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Tel Aviv, Is
ISBN: 3319783718 ISBN-13(EAN): 9783319783710
Издательство: Springer
Рейтинг:
Цена: 20962.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

The three volumes LNCS 10820, 10821, and 10822 constitute the thoroughly refereed proceedings of the 37th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2018, held in Tel Aviv, Israel, in April/May 2018.
The 69 full papers presented were carefully reviewed and selected from 294 submissions. The papers are organized into the following topical sections: foundations; lattices; random oracle model; fully homomorphic encryption; permutations; galois counter mode; attribute-based encryption; secret sharing; blockchain; multi-collision resistance; signatures; private simultaneous messages; masking; theoretical multiparty computation; obfuscation; symmetric cryptanalysis; zero-knowledge; implementing multiparty computation; non-interactive zero-knowledge; anonymous communication; isogeny; leakage; key exchange; quantum; non-malleable codes; and provable symmetric cyptography.
Discrete Mathematics with Cryptographic Applications: A Self-Teaching Introduction

Автор: Alexander I. Kheyfits
Название: Discrete Mathematics with Cryptographic Applications: A Self-Teaching Introduction
ISBN: 168392763X ISBN-13(EAN): 9781683927631
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 11088.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: Covers the discrete mathematics as it has been established after its emergence since the middle of the last century and its elementary applications to cryptography. The book can be used by anyone studying discrete mathematics, finite mathematics, and similar subjects. Any necessary prerequisites are explained and illustrated.

Cryptographic Hardware and Embedded Systems – CHES 2017

Автор: Wieland Fischer; Naofumi Homma
Название: Cryptographic Hardware and Embedded Systems – CHES 2017
ISBN: 3319667866 ISBN-13(EAN): 9783319667867
Издательство: Springer
Рейтинг:
Цена: 13974.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the proceedings of the 19th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2017, held in Taipei, Taiwan, in September 2017. The annual CHES conference highlights new results in the design and analysis of cryptographic hardware and soft- ware implementations.

Cryptographic Hardware and Embedded Systems – CHES 2016

Автор: Gierlichs
Название: Cryptographic Hardware and Embedded Systems – CHES 2016
ISBN: 3662531399 ISBN-13(EAN): 9783662531396
Издательство: Springer
Рейтинг:
Цена: 11460.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: This book constitutes the proceedings of the 18th International Conference on Cryptographic Hardware and Embedded Systems, CHES 2016, held in Santa Barbara, CA, USA, in August 2016. The 30 full papers presented in this volume were carefully reviewed and selected from 148 submissions. They were organized in topical sections named: side channel analysis; automotive security; invasive attacks; side channel countermeasures; new directions; software implementations; cache attacks; physical unclonable functions; hardware implementations; and fault attacks.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия