Atjaunināt sīkdatņu piekrišanu

E-grāmata: Progress in Cryptology - INDOCRYPT 2008: 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings

Edited by , Edited by , Edited by
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 5365
  • Izdošanas datums: 25-Nov-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540897545
Citas grāmatas par šo tēmu:
  • Formāts - PDF+DRM
  • Cena: 53,52 €*
  • * ši ir gala cena, t.i., netiek piemērotas nekādas papildus atlaides
  • Ielikt grozā
  • Pievienot vēlmju sarakstam
  • Šī e-grāmata paredzēta tikai personīgai lietošanai. E-grāmatas nav iespējams atgriezt un nauda par iegādātajām e-grāmatām netiek atmaksāta.
  • Formāts: PDF+DRM
  • Sērija : Lecture Notes in Computer Science 5365
  • Izdošanas datums: 25-Nov-2008
  • Izdevniecība: Springer-Verlag Berlin and Heidelberg GmbH & Co. K
  • Valoda: eng
  • ISBN-13: 9783540897545
Citas grāmatas par šo tēmu:

DRM restrictions

  • Kopēšana (kopēt/ievietot):

    nav atļauts

  • Drukāšana:

    nav atļauts

  • Lietošana:

    Digitālo tiesību pārvaldība (Digital Rights Management (DRM))
    Izdevējs ir piegādājis šo grāmatu šifrētā veidā, kas nozīmē, ka jums ir jāinstalē bezmaksas programmatūra, lai to atbloķētu un lasītu. Lai lasītu šo e-grāmatu, jums ir jāizveido Adobe ID. Vairāk informācijas šeit. E-grāmatu var lasīt un lejupielādēt līdz 6 ierīcēm (vienam lietotājam ar vienu un to pašu Adobe ID).

    Nepieciešamā programmatūra
    Lai lasītu šo e-grāmatu mobilajā ierīcē (tālrunī vai planšetdatorā), jums būs jāinstalē šī bezmaksas lietotne: PocketBook Reader (iOS / Android)

    Lai lejupielādētu un lasītu šo e-grāmatu datorā vai Mac datorā, jums ir nepieciešamid Adobe Digital Editions (šī ir bezmaksas lietotne, kas īpaši izstrādāta e-grāmatām. Tā nav tas pats, kas Adobe Reader, kas, iespējams, jau ir jūsu datorā.)

    Jūs nevarat lasīt šo e-grāmatu, izmantojot Amazon Kindle.

This book constitutes the refereed proceedings of the 9th International Conference on Cryptology in India, INDOCRYPT 2008, held in Kharagpur, India, in December 2008.



The 33 revised full papers were carefully reviewed and selected from 111 submissions. The papers are organized in topical sections on stream ciphers, cryptographic hash functions, public-key cryptography, security protocols, hardware attacks, block ciphers, cryptographic hardware, elliptic curve cryptography, and threshold cryptography.
Stream Ciphers.- Slid Pairs in Salsa20 and Trivium.- New Directions in
Cryptanalysis of Self-Synchronizing Stream Ciphers.- Analysis of RC4 and
Proposal of Additional Layers for Better Security Margin.- New Results on the
Key Scheduling Algorithm of RC4.- Cryptographic Hash Functions.- Two Attacks
on RadioGatśn.- Faster Multicollisions.- A New Type of 2-Block Collisions in
MD5.- New Collision Attacks against Up to 24-Step SHA-2.- Public-Key
Cryptography I.- Secure Hierarchical Identity Based Encryption Scheme in
the Standard Model.- A Fuzzy ID-Based Encryption Efficient When Error Rate Is
Low.- Type-Based Proxy Re-encryption and Its Construction.- Toward a Generic
Construction of Universally Convertible Undeniable Signatures from
Pairing-Based Signatures.- Security Protocols.- Concrete Security for Entity
Recognition: The Jane Doe Protocol.- Efficient and Strongly Secure
Password-Based Server Aided Key Exchange (Extended Abstract).- Round
Efficient Unconditionally Secure Multiparty Computation Protocol.- A New
Anonymous Password-Based Authenticated Key Exchange Protocol.- Group Key
Management: From a Non-hierarchical to a Hierarchical Structure.- Hardware
Attacks.- Scan Based Side Channel Attacks on Stream Ciphers and Their
Counter-Measures.- Floating Fault Analysis of Trivium.- Algebraic Methods in
Side-Channel Collision Attacks and Practical Collision Detection.- Block
Ciphers.- New Related-Key Boomerang Attacks on AES.- New Impossible
Differential Attacks on AES.- Reflection Cryptanalysis of Some Ciphers.- A
Differential-Linear Attack on 12-Round Serpent.- New AES Software Speed
Records.- Public-Key Cryptography II.- A New Class of Weak Encryption
Exponents in RSA.- Two New Efficient CCA-Secure Online Ciphers: MHCBC and
MCBC.- Cryptographic Hardware.-Chai-Tea, Cryptographic Hardware
Implementations of xTEA.- High Speed Compact Elliptic Curve Cryptoprocessor
for FPGA Platforms.- Elliptic Curve Cryptography.- More Discriminants with
the Brezing-Weng Method.- Another Approach to Pairing Computation in Edwards
Coordinates.- Threshold Cryptography.- A Verifiable Secret Sharing Scheme
Based on the Chinese Remainder Theorem.- Secure Threshold Multi Authority
Attribute Based Encryption without a Central Authority.