Topics in Cryptology - CT- RSA 2013 -
- Format: Broché Voir le descriptif
Vous en avez un à vendre ?
Vendez-le-vôtre71,50 €
Produit Neuf
Ou 17,88 € /mois
- Livraison à 0,01 €
- Livré entre le 5 et le 12 mai
Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9783642360947_dbm
- Payez directement sur Rakuten (CB, PayPal, 4xCB...)
- Récupérez le produit directement chez le vendeur
- Rakuten vous rembourse en cas de problème
Gratuit et sans engagement
Félicitations !
Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !
TROUVER UN MAGASIN
Retour
Avis sur Topics In Cryptology - Ct - Rsa 2013 Format Broché - Livre Littérature Générale
0 avis sur Topics In Cryptology - Ct - Rsa 2013 Format Broché - Livre Littérature Générale
Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.
-
Erazer Beast 16 X1 Ultimate (Md 62732) Intel Core Ultra 9 275hx Ordinateur Portable 16" Quad Hd+ 32 Go Ddr5-Sdram 2 To Ssd Nvidia Geforce Rtx 5090 Wi-Fi 6e (802.11ax) Windows 11 Home Noir
Neuf dès 107,15 €
-
Art Of Modern Rock
2 avis
Occasion dès 50,00 €
-
Diego Rivera. The Complete Murals
Neuf dès 97,04 €
Occasion dès 65,00 €
-
Francois Catroux
Occasion dès 71,38 €
-
Arda Reconstructed
Neuf dès 67,42 €
-
Hollywood Jewels: Movies, Jewelry, Stars
Occasion dès 106,99 €
-
Martin Chambi: 1920-1950 (Spanish Edition)
Occasion dès 87,72 €
-
Le Medecin Des Pauvres: 2000 Remèdes Et Savoirs De La Médecine Populaire (Édition Illustrée)
Occasion dès 65,89 €
-
Animal Eyes
Neuf dès 101,75 €
Occasion dès 114,87 €
-
Prisons
Neuf dès 39,50 €
Occasion dès 43,48 €
-
Bernard Frize: Longues Lignes (Souvent Fermees)
Occasion dès 63,99 €
-
Bmw R1200 Twins (04 - 09) Haynes Repair Manual
Neuf dès 45,11 €
Occasion dès 80,99 €
-
Fleet Tactics And Naval Operations, Third Edition
Neuf dès 39,33 €
-
Conversations With Wilder
Occasion dès 105,00 €
-
Lewis Carroll's Photography And Modern Childhood
Neuf dès 83,64 €
Occasion dès 39,71 €
-
Frobenius Splitting Methods In Geometry And Representation Theory
Occasion dès 69,32 €
-
Phenomenology Of Spirit
Neuf dès 48,69 €
Occasion dès 37,32 €
-
Pomellato
Occasion dès 80,00 €
-
Mobilier Art Deco
Occasion dès 40,00 €
-
La Sante Interdite
Occasion dès 71,00 €
Produits similaires
Présentation Topics In Cryptology - Ct - Rsa 2013 Format Broché
- Livre Littérature Générale
Résumé :
This book constitutes the refereed proceedings of the Cryptographers' Track at the RSA Conference 2013, CT-RSA 2013, held in San Francisco, CA, USA, in February/March 2013. The 25 revised full papers presented were carefully reviewed and selected from 89 submissions. The papers are grouped into topical sections covering: side channel attacks, digital signatures, public-key encryption, cryptographic protocols, secure implementation methods, symmetric key primitives, and identity-based encryption.
Sommaire:
Side Channel Attacks I.- Horizontal and Vertical Side-Channel Attacks against Secure RSA Implementations.-Timing Attack against Protected RSA-CRT Implementation Used in PolarSSL.- Digital Signatures I.-Fair Exchange of Short Signatures without Trusted Third Party.- Fully Secure Attribute-Based Systems with Short Ciphertexts/Signatures and Threshold Access Structures.- Public-Key Encryption I.- Robust and Plaintext-Aware Variant of Signed ElGamal Encryption.- Efficient Public Key Cryptosystem Resilient to Key Leakage Chosen Ciphertext Attacks.- Cryptographic Protocols I.- Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes.- Randomized Partial Checking Revisited.- Secure Implementation Methods.- Randomly Failed! The State of Randomness in Current Java Implementations.- Efficient Vector Implementations of AES-Based Designs: A Case Study and New Implementations for Gr?stl.- Symmetric Key Primitives I.- Collisions for the WIDEA-8 Compression Function.- Finding Collisions for Round-Reduced SM3.- Many Weak Keys for PRINTcipher: Fast Key Recovery and Countermeasures.- Side Channel Attacks II.- Applying Remote Side-Channel Analysis Attacks on a Security-Enabled NFC Tag.- Practical Leakage-Resilient Pseudorandom Objects with Minimum Public Randomness.- Cryptographic Protocols II.- Cryptanalytic Attacks on MIFARE Classic Protocol.- Asynchronous Computational VSS with Reduced Communication Complexity.- Public-Key Encryption II.-Proxy Re-Encryption in a Stronger Security Model Extended from CT-RSA2012.- Solving BDD by Enumeration: An Update.- Identity-Based Encryption.- The k-BDH Assumption Family: Bilinear Map Cryptography from Progressively Weaker Assumptions.- Accountable Authority Identity-Based Encryption with Public Traceability.- Efficient Delegation of Key Generation and Revocation Functionalities in Identity-Based Encryption.- Symmetric Key Primitives II.- The Low-Call Diet: Authenticated Encryption for Call Counting HSM Users.- A FullyHomomorphic Cryptosystem with Approximate Perfect Secrecy.- Weak Keys of the Full MISTY1 Block Cipher for Related-Key Differential Cryptanalysis.
Détails de conformité du produit
Personne responsable dans l'UE