Buch, Englisch, Band 2015, 266 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 423 g
Third International Conference, Seoul, Korea, December 8-9, 2000, Proceedings
Buch, Englisch, Band 2015, 266 Seiten, Paperback, Format (B × H): 155 mm x 235 mm, Gewicht: 423 g
Reihe: Lecture Notes in Computer Science
ISBN: 978-3-540-41782-8
Verlag: Springer Berlin Heidelberg
Zielgruppe
Research
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Zeichen- und Zahlendarstellungen
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Datensicherheit, Datenschutz
- Mathematik | Informatik EDV | Informatik Daten / Datenbanken Informationstheorie, Kodierungstheorie
- Interdisziplinäres Wissenschaften Wissenschaften: Forschung und Information Informationstheorie, Kodierungstheorie
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Internet, E-Mail, VoIP
- Mathematik | Informatik EDV | Informatik Technische Informatik Netzwerk-Hardware
- Sozialwissenschaften Medien- und Kommunikationswissenschaften Kommunikationswissenschaften Digitale Medien, Internet, Telekommunikation
- Mathematik | Informatik EDV | Informatik Informatik
- Mathematik | Informatik EDV | Informatik Technische Informatik Systemverwaltung & Management
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
Weitere Infos & Material
A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures.- On the strength of KASUMI without FL functions against Higher Order Differential Attack.- On MISTY1 Higher Order Differential Cryptanalysis.- Difference Distribution Attack on DONUT and Improved DONUT.- New Results on Correlation Immunity.- Elliptic Curves and Resilient Functions.- Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction.- Characterization of Elliptic Curve Traces Under FR-Reduction.- A Multi-party Optimistic Non-repudiation Protocol.- Secure Matchmaking Protocol.- An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA.- Efficient and Secure Member Deletion in Group Signature Schemes.- An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods.- An Internet Anonymous Auction Scheme.- Efficient Sealed-bid Auction using Hash Chain.- Micropayments for Wireless Communications.- Cryptographic Applications of Sparse Polynomials over Finite Rings.- Efficient anonymous fingerprinting of electronic information with improved automation with improved automatic identification of redistributors.- Hash to the Rescue: Space Minimization for PKI Directories.- A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management.