- 0 Results
Lowest price: € 83.41, highest price: € 158.40, average price: € 136.67
1
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Order
at AbeBooks.de
€ 83.41
Shipment: € 75.691
OrderSponsored link

Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings - Paperback

2010, ISBN: 3642146228

[EAN: 9783642146220], Gebraucht, guter Zustand, [PU: Springer 2010-07-30], Item is in like new condition with minor shelf wear. Might have a remainder mark or slight wear from sitting on … More...

NOT NEW BOOK. Shipping costs: EUR 75.69 LowKeyBooks, Sumas, WA, U.S.A. [65875000] [Rating: 5 (von 5)]
2
Order
at alibris.co.uk
€ 133.42
OrderSponsored link

Rabin, Tal (Editor):

Advances in Cryptology -- Crypto 2010: 30th Annual Cryptology Conference, Santa Barbara, Ca, Usa, August 15-19, 2010, Proceedings - Paperback

2010, ISBN: 9783642146220

Trade paperback, New., Trade paperback (US). Glued binding. 741 p. Contains: Unspecified, Illustrations, black & white, Figures. Lecture Notes in Computer Science, 6223., Berlin, Heidelbe… More...

Shipping costs:plus shipping costs Sparks, NV, Alibris
3
Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - Rabin, Tal (Editor)
Order
at AbeBooks.de
€ 158.40
Shipment: € 11.581
OrderSponsored link
Rabin, Tal (Editor):
Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - Paperback

2010

ISBN: 3642146228

[EAN: 9783642146220], Neubuch, [PU: Springer-Verlag New York Inc], 744 pages. 9.00x6.00x1.25 inches. In Stock., Books

NEW BOOK. Shipping costs: EUR 11.58 Revaluation Books, Exeter, United Kingdom [2134736] [Rating: 5 (von 5)]
4
Order
at Biblio.co.uk
$ 156.48
(aprox. € 156.59)
Shipment: € 11.791
OrderSponsored link
Rabin, Tal (Editor):
Advances in Cryptology-CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010 Proceedings - Paperback

2010, ISBN: 9783642146220

Springer-Verlag New York Inc, 2010. Paperback. New. 744 pages. 9.00x6.00x1.25 inches., Springer-Verlag New York Inc, 2010, 6

Shipping costs: EUR 11.79 Revaluation Books
5
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science) Paperback
Order
at AbeBooks.de
€ 151.55
Shipment: € 9.041
OrderSponsored link
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings (Lecture Notes in Computer Science) Paperback - Paperback

2010, ISBN: 3642146228

[EAN: 9783642146220], Neubuch, [PU: Springer], This item is printed on demand, Books

NEW BOOK. Shipping costs: EUR 9.04 booksXpress, Freehold, NJ, U.S.A. [71410708] [Rating: 4 (von 5)]

1As some platforms do not transmit shipping conditions to us and these may depend on the country of delivery, the purchase price, the weight and size of the item, a possible membership of the platform, a direct delivery by the platform or via a third-party provider (Marketplace), etc., it is possible that the shipping costs indicated by find-more-books.com / find-more-books.com do not correspond to those of the offering platform.
Details of the book
Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings: 6223 (Lecture Notes in Computer Science, 6223)

This book constitutes the refereed proceedings of the 30th Annual International Cryptology Conference, CRYPTO 2010, held in Santa Barbara, CA, USA in August 2010, co-located with CHES 2010, the workshop on Cryptographic Hardware and Embedded Systems. The 39 revised full papers presented were carefully reviewed and selected from 203 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on leakage, lattice, homomorphic encryption, theory and applications, key exchange, OAEP/RSA, CCA, attacks, composition, computation delegation and obfuscation, multiparty computation, pseudorandomness, and quantum.

Details of the book - Advances in Cryptology -- CRYPTO 2010: 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings: 6223 (Lecture Notes in Computer Science, 6223)


EAN (ISBN-13): 9783642146220
ISBN (ISBN-10): 3642146228
Hardcover
Paperback
Publishing year: 2010
Publisher: Springer
744 Pages
Weight: 1,064 kg
Language: eng/Englisch

Book in our database since 2009-09-07T03:34:27-04:00 (New York)
Detail page last modified on 2022-09-05T18:29:54-04:00 (New York)
ISBN/EAN: 9783642146220

ISBN - alternate spelling:
3-642-14622-8, 978-3-642-14622-0


Information from Publisher

Author: Tal Rabin
Title: Lecture Notes in Computer Science; Security and Cryptology; Advances in Cryptology -- CRYPTO 2010 - 30th Annual Cryptology Conference, Santa Barbara, CA, USA, August 15-19, 2010, Proceedings
Publisher: Springer; Springer Berlin
744 Pages
Publishing year: 2010-07-30
Berlin; Heidelberg; DE
Weight: 1,128 kg
Language: English
106,99 € (DE)
109,99 € (AT)
118,00 CHF (CH)
POD
XIV, 744 p. 63 illus.

BC; Book; Hardcover, Softcover / Informatik, EDV/Informatik; Kodierungstheorie und Verschlüsselung (Kryptologie); Verstehen; Informatik; AES; Hashing; Internet; Permutation; algebraic geometry; authentication; block ciphers; collision resistance; complexity; cryptography; embedded systems; security; trust; C; Cryptology; Management of Computing and Information Systems; Computer Communication Networks; Systems and Data Security; Computers and Society; Discrete Mathematics in Computer Science; Cryptology; IT Operations; Computer Communication Networks; Data and Information Security; Computers and Society; Discrete Mathematics in Computer Science; Computer Science; Kryptografie, Verschlüsselungstechnologie; Wirtschaftsmathematik und -informatik, IT-Management; Netzwerk-Hardware; Computersicherheit; Netzwerksicherheit; Digital- und Informationstechnologien: soziale und ethische Aspekte; Mathematik für Informatiker; Diskrete Mathematik; EA

Leakage.- Circular and Leakage Resilient Public-Key Encryption under Subgroup Indistinguishability.- Leakage-Resilient Pseudorandom Functions and Side-Channel Attacks on Feistel Networks.- Protecting Cryptographic Keys against Continual Leakage.- Securing Computation against Continuous Leakage.- Lattice.- An Efficient and Parallel Gaussian Sampler for Lattices.- Lattice Basis Delegation in Fixed Dimension and Shorter-Ciphertext Hierarchical IBE.- Homomorphic Encryption.- Toward Basing Fully Homomorphic Encryption on Worst-Case Hardness.- Additively Homomorphic Encryption with d-Operand Multiplications.- i-Hop Homomorphic Encryption and Rerandomizable Yao Circuits.- Theory and Applications.- Interactive Locking, Zero-Knowledge PCPs, and Unconditional Cryptography.- Fully Secure Functional Encryption with General Relations from the Decisional Linear Assumption.- Structure-Preserving Signatures and Commitments to Group Elements.- Efficient Indifferentiable Hashing into Ordinary Elliptic Curves.- Key Exchange, OAEP/RSA, CCA.- Credential Authenticated Identification and Key Exchange.- Password-Authenticated Session-Key Generation on the Internet in the Plain Model.- Instantiability of RSA-OAEP under Chosen-Plaintext Attack.- Efficient Chosen-Ciphertext Security via Extractable Hash Proofs.- Attacks.- Factorization of a 768-Bit RSA Modulus.- Correcting Errors in RSA Private Keys.- Improved Differential Attacks for ECHO and Grøstl.- A Practical-Time Related-Key Attack on the KASUMI Cryptosystem Used in GSM and 3G Telephony.- Composition.- Universally Composable Incoercibility.- Concurrent Non-Malleable Zero Knowledge Proofs.- Equivalence of Uniform Key Agreement and Composition Insecurity.- Computation Delegation and Obfuscation.- Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers.- Improved Delegation of Computation Using Fully Homomorphic Encryption.- Oblivious RAM Revisited.- On Strong Simulation and Composable Point Obfuscation.- Multiparty Computation.- Protocols for Multiparty Coin Toss with Dishonest Majority.- Multiparty Computation for Dishonest Majority: From Passive to Active Security at Low Cost.- Secure Multiparty Computation with Minimal Interaction.- A Zero-One Law for Cryptographic Complexity with Respect to Computational UC Security.- Pseudorandomness.- On Generalized Feistel Networks.- Cryptographic Extraction and Key Derivation: The HKDF Scheme.- Time Space Tradeoffs for Attacks against One-Way Functions and PRGs.- Pseudorandom Functions and Permutations Provably Secure against Related-Key Attacks.- Quantum.- Secure Two-Party Quantum Evaluation of Unitaries against Specious Adversaries.- On the Efficiency of Classical and Quantum Oblivious Transfer Reductions.- Sampling in a Quantum Population, and Applications.

More/other books that might be very similar to this book

Latest similar book:
9783642146237 Advances in Cryptology -- CRYPTO 2010 (Springer)


< to archive...