Atjaunināt sīkdatņu piekrišanu

E-grāmata: New Codebreakers: Essays Dedicated to David Kahn on the Occasion of His 85th Birthday

  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 9100
  • Izdošanas datums: 17-Mar-2016
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783662493014
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 9100
  • Izdošanas datums: 17-Mar-2016
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783662493014
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This Festschrift volume is published in honor of DavidKahn and is the outcome of a Fest held in Luxembourg in 2010 on the occasion ofDavid Kahn"s 80 th birthday. The title of this books leans on thetitle of a serious history of cryptology named "The Cryptographers", written byDavid Kahn and published in 1967.This volume contains 35 talks dealing withcryptography as a whole. They are organized in topical section named: history;technology - past, present, future; efficient cryptographic implementations;treachery and perfidy; information security; cryptanalysis; side-channelattacks; randomness embedded system security; public-key cryptography; andmodels and protocols.
History.- Mary of Guises enciphered letters.- About Professionalisation
in the Intelligence Community: the French Cryptologists (ca 1870-ca 1945).-
Myths and legends.- The One-Time Pad and the Index of Coincidence.-
Technology - Past, Present, Future.-  The Fall of a Tiny Star.- Post-Quantum
Cryptography: State of the Art.- What is the future of cryptography?.-
Efficient Cryptographic Implementations.- Bitsliced High-Performance AES-ECB
on GPUs.- Buying AES Design Resistance with Speed and Energy.- Double-Speed
Barrett Moduli.- Treachery and Perfidy.- Failure is Also an Option.- How to
(Carefully) Breach a Service Contract?.- Information Security.- SpoofKiller:
You can teach people how to pay, but not how to pay attention.-
Cyber-Physical Systems Security.- Practical Techniques Building on Encryption
for Protecting and Managing Data in the Cloud.- Cryptanalysis.- Cryptography
as an Attack Technology: Proving the RSA/Factoring Kleptographic Attack.-
Dual EC: A Standardized BackDoor.- An Improved Differential Attack on Full
GOST.- Cryptographic Hash Functions and Expander Graphs: The End of the
Story?.- Side-Channel Attacks.- Polynomial Evaluation and Side Channel
Analysis.- Photonic Power Firewalls.- A Heuristic Approach to Assist Side
Channel Analysis of the Data Encryption Standard.- Improving the Big Mac
attack on Elliptic Curve Cryptography.- Randomness.- Randomness testing:
result interpretation and speed.- A fully-digital Chaos-based Random Bit
Generator.- Embedded System Security.- Secure Application Execution in Mobile
Devices.- Hardware-enforced Protection against Buffer Overflow using Masked
Program Counter.- Public-Key Cryptography.- Hierarchical Identities from
Group Signatures and Pseudonymous Signatures.- Secure ElGamal-type
Cryptosystems Without Message Encoding.- Safe-Errors on SPA Protected
implementations with the Atomicity Technique.- Models and Protocols.- Clever
Arbiters versus Malicious Adversaries: On the Gap between Known-Input
Security and Chosen-Input Security.- Security Analysis of the Modular
Enhanced Symmetric Role Authentication (mERA) Protocol.- Crypto Santa.