- 5 Risultati
prezzo più basso: € 53,49, prezzo più alto: € 173,87, prezzo medio: € 83,68
1
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223)
Ordina
da amazon.de
€ 173,87
Spedizione: € 3,001
OrdinaLink sponsorizzato

Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science, 6223, Band 6223) - edizione con copertina flessibile

2010, ISBN: 9783642146220

Springer, Taschenbuch, Auflage: 2010, 758 Seiten, Publiziert: 2010-07-30T00:00:01Z, Produktgruppe: Buch, Hersteller-Nr.: 12012144, 2.49 kg, Informationsmanagement, Management, Business & … Altro …

Costi di spedizione:Les coûts d'expédition peuvent différer des coûts réels. (EUR 3.00)
2
Ordina
da alibris.co.uk
£ 49,53
(indicativi € 57,52)
OrdinaLink sponsorizzato

Tal Rabin:

Advances in Cryptologycrypto 2010 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 1519, 2010, Proceedings 6223 Lecture Notes in Computer Science - edizione con copertina flessibile

2007, ISBN: 9783642146220

Softcover, PLEASE NOTE, WE DO NOT SHIP TO DENMARK. New Book. Shipped from UK in 4 to 14 days. Established seller since 2000. Please note we cannot offer an expedited shipping service from… Altro …

Costi di spedizione:Costi di spedizione aggiuntivi Fairford, GLOS, Paperbackshop International
3
Ordina
da alibris.co.uk
£ 49,37
(indicativi € 57,33)
OrdinaLink sponsorizzato
Rabin, Tal (Editor):
Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings - edizione con copertina flessibile

2010

ISBN: 9783642146220

Trade paperback, New., Trade paperback (US). Glued binding. 744 p. Contains: Unspecified, Illustrations, black & white, Figures., Berlin, Heidelberg, [PU: Springer]

Costi di spedizione:Costi di spedizione aggiuntivi Sparks, NV, Alibris
4
Ordina
da AbeBooks.co.uk
£ 65,59
(indicativi € 76,17)
Spedizione: € 6,991
OrdinaLink sponsorizzato
Rabin, Tal (Editor):
Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - edizione con copertina flessibile

2010, ISBN: 3642146228

[EAN: 9783642146220], New book, [SC: 6.99], [PU: Springer-Verlag New York Inc], 744 pages. 9.00x6.00x1.25 inches. In Stock., Books

NEW BOOK. Costi di spedizione: EUR 6.99 Revaluation Books, Exeter, United Kingdom [2134736] [Rating: 5 (of 5)]
5
Advances in Cryptology -- CRYPTO 2010 - Tal Rabin
Ordina
da lehmanns.de
€ 53,49
Spedizione: € 0,001
OrdinaLink sponsorizzato
Tal Rabin:
Advances in Cryptology -- CRYPTO 2010 - Prima edizione

2010, ISBN: 9783642146220

edizione con copertina flessibile

30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings, Buch, Softcover, [PU: Springer Berlin], Springer Berlin, 2010

Costi di spedizione:Versand in 7-10 Tagen. (EUR 0.00)

1Poiché alcune piattaforme non trasmettono le condizioni di spedizione e queste possono dipendere dal paese di consegna, dal prezzo di acquisto, dal peso e dalle dimensioni dell'articolo, dall'eventuale iscrizione alla piattaforma, dalla consegna diretta da parte della piattaforma o tramite un fornitore terzo (Marketplace), ecc. è possibile che le spese di spedizione indicate da eurolibro non corrispondano a quelle della piattaforma offerente.

Dati bibliografici del miglior libro corrispondente

Dettagli del libro
Advances in Cryptology -- CRYPTO 2010

This book constitutes the refereed proceedings of the 30th Annual International Cryptology Conference, CRYPTO 2010, held in Santa Barbara, CA, USA in August 2010, co-located with CHES 2010, the workshop on Cryptographic Hardware and Embedded Systems. The 39 revised full papers presented were carefully reviewed and selected from 203 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on leakage, lattice, homomorphic encryption, theory and applications, key exchange, OAEP/RSA, CCA, attacks, composition, computation delegation and obfuscation, multiparty computation, pseudorandomness, and quantum.

Informazioni dettagliate del libro - Advances in Cryptology -- CRYPTO 2010


EAN (ISBN-13): 9783642146220
ISBN (ISBN-10): 3642146228
Copertina rigida
Copertina flessibile
Anno di pubblicazione: 2010
Editore: Springer Berlin
744 Pagine
Peso: 1,064 kg
Lingua: eng/Englisch

Libro nella banca dati dal 2009-09-07T09:34:27+02:00 (Zurich)
Pagina di dettaglio ultima modifica in 2024-04-01T08:01:18+02:00 (Zurich)
ISBN/EAN: 9783642146220

ISBN - Stili di scrittura alternativi:
3-642-14622-8, 978-3-642-14622-0
Stili di scrittura alternativi e concetti di ricerca simili:
Autore del libro : tal, rabin lea, craig charles, charles barbara, ieee computer society
Titolo del libro: crypto 2010, advances cryptology, barbara, les crypto, advances computer security, lecture notes computer science, august santa


Dati dell'editore

Autore: Tal Rabin
Titolo: Lecture Notes in Computer Science; Security and Cryptology; Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Editore: Springer; Springer Berlin
744 Pagine
Anno di pubblicazione: 2010-07-30
Berlin; Heidelberg; DE
Lingua: Inglese
53,49 € (DE)
54,99 € (AT)
59,00 CHF (CH)
Available
XIV, 744 p. 63 illus.

BC; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Hashing; Internet; Permutation; algebraic geometry; authentication; block ciphers; collision resistance; complexity; cryptography; embedded systems; security; trust; Cryptology; IT Operations; Computer Communication Networks; Data and Information Security; Computers and Society; Discrete Mathematics in Computer Science; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Mathematik für Informatiker; Diskrete Mathematik; EA

Leakage.- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability.- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.- Protecting Cryptographic Keys against Continual Leakage.- Securing Computation against Continuous Leakage.- Lattice.- An Efficient and Parallel Gaussian Sampler for Lattices.- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.- Homomorphic Encryption.- Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.- Additively Homomorphic Encryption with d-Operand Multiplications.- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.- Theory and Applications.- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.- Structure-Preserving Signatures and Commitments to Group Elements.- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.- Key Exchange, OAEP/RSA, CCA.- Credential Authenticated Identification and Key Exchange.- Password-Authenticated Session-Key Generation on the Internet in the Plain Model.- Instantiability of RSA-OAEP under Chosen-Plaintext Attack.- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.- Attacks.- Factorization of a 768-Bit RSA Modulus.- Correcting Errors in RSA Private Keys.- Improved Differential Attacks for ECHO and Grøstl.- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.- Composition.- Universally Composable Incoercibility.- Concurrent Non-Malleable Zero Knowledge Proofs.- Equivalence of Uniform Key Agreement and Composition Insecurity.- Computation Delegation and Obfuscation.- Non-interactive Verifiable Computing:Outsourcing Computation to Untrusted Workers.- Improved Delegation of Computation Using Fully Homomorphic Encryption.- Oblivious RAM Revisited.- On Strong Simulation and Composable Point Obfuscation.- Multiparty Computation.- Protocols for Multiparty Coin Toss with Dishonest Majority.- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.- Secure Multiparty Computation with Minimal Interaction.- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.- Pseudorandomness.- On Generalized Feistel Networks.- Cryptographic Extraction and Key Derivation: The HKDF Scheme.- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.- Quantum.- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.- Sampling in a Quantum Population, and Applications.
Up-to-date research in cryptology

< Per archiviare...