i
Ein
Tipp
vom
Eldar Team
Je mehr Sie bestellen, desto grösser Ihr Rabatt
Sofort lieferbar

Buch
Buch
Fachbuch
2006
2006
Advances in Cryptology - CRYPTO 2006
26th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 2006, Proceedings
Herausgeber/-in
Kollektion
Verlag
ISBN
EAN
978-3-540-37432-9
9783540374329
Artikel-Nr.
YKY6QZR
Sofort lieferbar:
2
Kostenloser Versand
Rabatt
-10.9
%
CHF
130.00
CHF
115.88
Anzahl
1
Maximale
Lieferzeit
5
Arbeitstage
Freitag
01.07.2022
Dieses Buch abonnieren
Immer die neuste Auflage erhalten
This book constitutes the refereed proceedings of the 26th Annual International Cryptology Conference, CRYPTO 2006, held in Santa Barbara, California, USA in August 2006. The 34 revised full papers presented together with 2 invited lectures were carefully reviewed and selected from 250 submissions. The papers address all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications.
Stichwörter
Research
Inhaltsverzeichnis
Rigorous Bounds on Cryptanalytic Time/Memory Tradeoffs.- On the Power of the Randomized Iterate.- Strengthening Digital Signatures Via Randomized Hashing.- Round-Optimal Composable Blind Signatures in the Common Reference String Model.- On Signatures of Knowledge.- Non-interactive Zaps and New Techniques for NIZK.- Rankin’s Constant and Blockwise Lattice Reduction.- Lattice-Based Cryptography.- A Method for Making Password-Based Key Exchange Resilient to Server Compromise.- Mitigating Dictionary Attacks on Password-Protected Local Storage.- Rationality and Adversarial Behavior in Multi-party Computation.- When Random Sampling Preserves Privacy.- Tight Bounds for Unconditional Authentication Protocols in the Manual Channel and Shared Key Models.- Robust Fuzzy Extractors and Authenticated Key Agreement from Close Secrets.- On Forward-Secure Storage.- Construction of a Non-malleable Encryption Scheme from Any Semantically Secure One.- Anonymous Hierarchical Identity-Based Encryption (Without Random Oracles).- Fast Algorithms for the Free Riders Problem in Broadcast Encryption.- The Number Field Sieve in the Medium Prime Case.- Inverting HFE Is Quasipolynomial.- Cryptanalysis of 2R? Schemes.- Receipt-Free Universally-Verifiable Voting with Everlasting Privacy.- Cryptographic Protocols for Electronic Voting.- Asymptotically Optimal Two-Round Perfectly Secure Message Transmission.- Random Selection with an Adversarial Majority.- Oblivious Transfer and Linear Functions.- On Expected Constant-Round Protocols for Byzantine Agreement.- Robust Multiparty Computation with Linear Communication Complexity.- On Combining Privacy with Guaranteed Output Delivery in Secure Multiparty Computation.- Scalable Secure Multiparty Computation.- Algebraic Geometric Secret Sharing Schemes and Secure Multi-Party Computations over Small Fields.- Automated Security Proofs with Sequences of Games.- On Robust Combiners for Private Information Retrieval and Other Primitives.- On the Impossibility of Efficiently Combining Collision Resistant Hash Functions.- On the Higher Order Nonlinearities of Algebraic Immune Functions.- New Proofs for NMAC and HMAC: Security Without Collision-Resistance.
Herausgeber/-in
Herausgegeben von
Publikation
Deutschland
08.08.2006
Sprache
Englisch
Buch (Softcover)
622 Seiten
Kostenlos: Schweiz & Liechtenstein
Für
Deutschland oder
Frankreich werden die
Versandgebühren im Warenkorb berechnet.
Bestellen Sie einfach auf
Rechnung oder
bezahlen Sie bequem und
gebührenfrei mit
Twint,
Kreditkarte,
PostFinance,
Apple,
Google oder
Samsung Pay.
Passende Themen
Unterkategorie
Computernetzwerke & Sicherheit
Unterkategorie
Lexika, Nachschlagewerke, Enzyklopädien
Unterkategorie
Wirtschaftsinformatik & Wirtschaftsmathematik
# Mehr aus der Kollektion:
Lecture Notes in Computer Science
Kollektion abonnieren
Immer die neuste Publikation erhalten
oder
Buch einzeln bestellen
Zurück
Zum Start