注冊(cè) | 登錄讀書好,好讀書,讀好書!
讀書網(wǎng)-DuShu.com
當(dāng)前位置: 首頁(yè)出版圖書科學(xué)技術(shù)計(jì)算機(jī)/網(wǎng)絡(luò)信息安全信息安全和密碼學(xué)

信息安全和密碼學(xué)

信息安全和密碼學(xué)

定 價(jià):¥654.84

作 者: Dongho Won 著
出版社: 湖南文藝出版社
叢編項(xiàng):
標(biāo) 簽: 暫缺

購(gòu)買這本書可以去


ISBN: 9783540417828 出版時(shí)間: 2000-12-01 包裝: 平裝
開本: 頁(yè)數(shù): 字?jǐn)?shù):  

內(nèi)容簡(jiǎn)介

  Book De*ionThis book constitutes the thoroughly refereed post-proceedings of the Third International Conference on Information Security and Cryptology, ICISC 2000, held in Seoul, Korea, in December 2000.The 20 revised full papers presented were carefully reviewed and selected from a total of 56 submissions. Among the topics addressed are cryptanalysis, elliptic curve cryptography, cryptographic protocols, block ciphers, hash functions, multi-party protocols, digital signatures, E-commerce, anonymous auction systems, finite field polynomials, anonymous fingerprinting, network security, and security evaluation systems.

作者簡(jiǎn)介

暫缺《信息安全和密碼學(xué)》作者簡(jiǎn)介

圖書目錄

A Note on the Higher Order Differential Attack of Block Ciphers with Two-Block Structures
On the Strength of KASUMI without FL Functions against Higher Order Differential Attack
On MISTY1 Higher Order Differential Cryptanalysis
Difference Distribution Attack on DONUT and Improved DONUT
New Results on Correlation Immunity
Elliptic Curves and Resilient Functions
Fast Universal Hashing with Small Keys and No Preprocessing: The PolyR Construction
Characterization of Elliptic Curve Traces under FR-Reduction
A Multi-party Optimistic Non-repudiation Protocol
Secure Matchmaking Protocol
An Improved Scheme of the Gennaro-Krawczyk-Rabin Undeniable Signature System Based on RSA
Efficient and Secure Member Deletion in Group Signature Schemes
An Efficient and Practical Scheme for Privacy Protection in the E-Commerce of Digital Goods
An Internet Anonymous Auction Scheme
Efficient Sealed-Bid Auction Using Hash Chain
Micropayments for Wireless Communications
Cryptographic Applications of Sparse Polynomials over Finite Rings
Efficient Anonymous Fingerprinting of Electronic Information with Improved Automatic Identification of Redistributors
Hash to the Rescue: Space Minimization for PKI Directories
A Design of the Security Evaluation System for Decision Support in the Enterprise Network Security Management
Author Index

本目錄推薦

掃描二維碼
Copyright ? 讀書網(wǎng) ranfinancial.com 2005-2020, All Rights Reserved.
鄂ICP備15019699號(hào) 鄂公網(wǎng)安備 42010302001612號(hào)