logo
logo
x
바코드검색
BOOKPRICE.co.kr
책, 도서 가격비교 사이트
바코드검색

인기 검색어

실시간 검색어

검색가능 서점

도서목록 제공

Advances in Cryptology - Auscrypt '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990

Advances in Cryptology - Auscrypt '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990 (Paperback, 1990)

Josef Pieprzyk, Jennifer Seberry (엮은이)
Springer
99,980원

일반도서

검색중
서점 할인가 할인률 배송비 혜택/추가 실질최저가 구매하기
81,980원 -18% 0원
4,100원
77,880원 >
yes24 로딩중
교보문고 로딩중
notice_icon 검색 결과 내에 다른 책이 포함되어 있을 수 있습니다.

중고도서

검색중
서점 유형 등록개수 최저가 구매하기
로딩중

eBook

검색중
서점 정가 할인가 마일리지 실질최저가 구매하기
로딩중

책 이미지

Advances in Cryptology - Auscrypt '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990
eBook 미리보기

책 정보

· 제목 : Advances in Cryptology - Auscrypt '90: International Conference on Cryptology Sydney, Australia, January 8-11, 1990 (Paperback, 1990) 
· 분류 : 외국도서 > 컴퓨터 > 보안 > 암호
· ISBN : 9783540530008
· 쪽수 : 462쪽
· 출판일 : 1990-08-22

목차

The implementation of elliptic curve cryptosystems.- Direct demonstration of the power to break public-key cryptosystems.- Continued fractions and the Berlekamp-Massey algorithm.- Nonlinear generators of binary sequences with controllable complexity and double key.- K-M sequence is forwardly predictable.- Lower bounds on the weight complexities of cascaded binary sequences.- Secure user access control for public networks.- Formal specification and verification of secure communication protocols.- Network security policy models.- KEYMEX: An expert system for the design of key management schemes.- On the formal analysis of PKCS authentication protocols.- Some remarks on authentication systems.- Meet-in-the-middle attack on digital signature schemes.- A binary sequence generator based on Ziv-Lempel source coding.- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence.- Parallel generation of pseudo-random sequences.- Large primes in stream cipher cryptography.- Comparison of block ciphers.- Key scheduling in des type cryptosystems.- LOKI - A cryptographic primitive for authentication and secrecy applications.- Permutation generators of alternating groups.- Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms.- A (non-practical) three-pass identification protocol using coding theory.- Demonstrating possession without revealing factors and its application.- Anonymous one-time signatures and flexible untraceable electronic cash.- Dyadic matrices and their potential significance in cryptography (abstract).- A note on strong Fibonacci pseudoprimes.- On the significance of the directed acyclic word graph in cryptology.- Solving equations in sequences.- The practical application of state of the art security in real environments.- RSA as a benchmark for multiprocessor machines.- Range equations and range matrices: a study in statistical database security.- Record encryption in distributed databases.- VLSI design for exponentiation in GF(2n).- A fast modular-multiplication module for smart cards.- Minos: Extended user authentication.- Universal logic sequences.- The three faces of information security.- Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system.

저자소개

이 포스팅은 쿠팡 파트너스 활동의 일환으로,
이에 따른 일정액의 수수료를 제공받습니다.
이 포스팅은 제휴마케팅이 포함된 광고로 커미션을 지급 받습니다.
도서 DB 제공 : 알라딘 서점(www.aladin.co.kr)
최근 본 책