logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Advances in Cryptology - Eurocrypt 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland,

Advances in Cryptology - Eurocrypt 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, (Paperback, 2004)

Christian Cachin, Jan Camenisch (엮은이)
Springer-Verlag New York Inc
231,360원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
189,710원 -18% 0원
9,490원
180,220원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Advances in Cryptology - Eurocrypt 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland,
eBook 미리보기

책 정보

· 제목 : Advances in Cryptology - Eurocrypt 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, (Paperback, 2004) 
· 분류 : 외국도서 > 컴퓨터 > 컴퓨터 공학
· ISBN : 9783540219354
· 쪽수 : 630쪽
· 출판일 : 2004-04-22

목차

Private Computation.- Efficient Private Matching and Set Intersection.- Positive Results and Techniques for Obfuscation.- Secure Computation of the k th -Ranked Element.- Signatures I.- Short Signatures Without Random Oracles.- Sequential Aggregate Signatures from Trapdoor Permutations.- Unconditional Security.- On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission.- The Exact Price for Unconditionally Secure Asymmetric Cryptography.- On Generating the Initial Key in the Bounded-Storage Model.- Distributed Cryptography.- Practical Large-Scale Distributed Key Generation.- Optimal Communication Complexity of Generic Multicast Key Distribution.- Foundations I.- An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem.- Black-Box Composition Does Not Imply Adaptive Security.- Identity-Based Encryption.- Chosen-Ciphertext Security from Identity-Based Encryption.- Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles.- Elliptic Curves.- Construction of Secure Random Curves of Genus 2 over Prime Fields.- Projective Coordinates Leak.- Signatures II.- Security Proofs for Identity-Based Identification and Signature Schemes.- Concurrent Signatures.- The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures.- Public-Key Cryptography.- Public-Key Steganography.- Immunizing Encryption Schemes from Decryption Errors.- Secure Hashed Diffie-Hellman over Non-DDH Groups.- Foundations II.- On Simulation-Sound Trapdoor Commitments.- Hash Function Balance and Its Impact on Birthday Attacks.- Multiparty Computation.- Multi-party Computation with Hybrid Security.- On the Hardness of Information-Theoretic Multiparty Computation.- Dining Cryptographers Revisited.- Cryptanalysis.- Algebraic Attacks and Decomposition of Boolean Functions.- Finding Small Roots of Bivariate Integer Polynomial Equations Revisited.- New Applications.- Public Key Encryption with Keyword Search.- Fuzzy Extractors: How to Generate Strong Keys from Biometrics and Other Noisy Data.- Algorithms and Implementation.- Merkle Tree Traversal in Log Space and Time.- Can We Trust Cryptographic Software? Cryptographic Flaws in GNU Privacy Guard v1.2.3.- Anonymity.- Traceable Signatures.- Handcuffing Big Brother: an Abuse-Resilient Transaction Escrow Scheme.- Anonymous Identification in Ad Hoc Groups.

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책