免费下载书籍地址:PDF下载地址
精美图片

Selected Areas in Cryptography密码术的选定区/会议录书籍详细信息
- ISBN:9783540243274
- 作者:暂无作者
- 出版社:暂无出版社
- 出版时间:2005-03
- 页数:353
- 价格:517.10
- 纸张:胶版纸
- 装帧:平装
- 开本:暂无开本
- 语言:未知
- 丛书:暂无丛书
- TAG:暂无
- 豆瓣评分:暂无豆瓣评分
内容简介:
This book constitutes the thoroughly refereed post-proceedings of the 11th International Workshop on Selected Areas in Cryptography, SAC 2004, held in Waterloo, Canada in August 2004.
The 24 revised full papers presented were carefully selected during two rounds of reviewing and improvement. The papers are organized in topical sections on stream cipher analysis, side channel analysis, block cipher design, efficient implementations, secret key cryptography, cryptanalysis, and cryptographic protocols.
书籍目录:
Stream Cipher Cryptanalysis
An Improved Correlation Attack on A5/1
Extending the Resynchronization Attack
A New Simple Technique to Attack Filter Generators and Related Ciphers
Side-Channel Analysis
On XTR and Side-Channel Analysis
Provably Secure Masking of AES
Block Cipher Design
Perfect Diffusion Primitives for Block Ciphers - Building Efficient MDS Matrices
Security of the MISTY Structure in the Luby-Rackoff Model: Improved Results
FOX: A New Family of Block Ciphers
Efficient Implementations
A Note on the Signed Sliding Window Integer Recoding and a Left-to-Right Analogue
Fast Irreducibility Testing for XTR Using a Gaussian Normal Basis of Low Complexity
Modular Number Systems: Beyond the Mersenne Family
Efficient Doubling on Genus Two Curves over Binary Fields
Secret Key Cryptography I
About the Security of Ciphers (Semantic Security and Pseudo-Random Permutations)
A Subliminal Channel in Secret Block Ciphers
Blockwise Adversarial Model for On-line Ciphers and Symmetric Encryption Schemes
Cryptanalysis
Cryptanalysis of a White Box AES Implementation
Predicting Subset Sum Pseudorandom Generators
Collision Attack and Pseudorandomness of Reduced-Round Camellia
Cryptographic Protocols
Password Based Key Exchange with Mutual Authentication
Product Construction of Key Distribution Schemes for Sensor Networks
……
Secret Key Cryptography II
Author Index
作者介绍:
暂无相关内容,正在全力查找中
出版社信息:
暂无出版社相关信息,正在全力查找中!
书籍摘录:
暂无相关书籍摘录,正在全力查找中!
在线阅读/听书/购买/PDF下载地址:
在线阅读地址:Selected Areas in Cryptography密码术的选定区/会议录在线阅读
在线听书地址:Selected Areas in Cryptography密码术的选定区/会议录在线收听
在线购买地址:Selected Areas in Cryptography密码术的选定区/会议录在线购买
原文赏析:
暂无原文赏析,正在全力查找中!
其它内容:
编辑推荐
The LNCS series reports state-of-the-art results in computer science research, development, and education, at a high level and in both printed and electronic form. Enjoying tight cooperation with the R&D community,with numerous individuals, as well as with prestigious organizations and societies, LNCS has grown into the most comprehensive computer science research forum available.
The scope of LNCS, including its subseries LNAI and LNBI, spans the whole range of computer science and information technology including interdisciplinary topics in a variety of application fields. The type of material published traditionally includes
-proceedings (published in time for the respective conference)
-post-proceedings (consisting of thoroughly revised final full papers)
-research monographs (which may be based on outstanding PhD work,research projects, technical reports, etc.)
书籍真实打分
故事情节:4分
人物塑造:9分
主题深度:7分
文字风格:8分
语言运用:3分
文笔流畅:7分
思想传递:4分
知识深度:6分
知识广度:4分
实用性:5分
章节划分:4分
结构布局:3分
新颖与独特:7分
情感共鸣:7分
引人入胜:6分
现实相关:7分
沉浸感:5分
事实准确性:8分
文化贡献:4分
网站评分
书籍多样性:7分
书籍信息完全性:3分
网站更新速度:5分
使用便利性:8分
书籍清晰度:6分
书籍格式兼容性:7分
是否包含广告:8分
加载速度:9分
安全性:3分
稳定性:4分
搜索功能:8分
下载便捷性:9分
下载点评
- 图文清晰(535+)
- 图书多(136+)
- 傻瓜式服务(87+)
- 中评多(595+)
- 二星好评(372+)
- 章节完整(555+)
下载评价
网友 陈***秋:不错,图文清晰,无错版,可以入手。
网友 寇***音:好,真的挺使用的!
网友 丁***菱:好好好好好好好好好好好好好好好好好好好好好好好好好
网友 国***舒:中评,付点钱这里能找到就找到了,找不到别的地方也不一定能找到
网友 訾***晴:挺好的,书籍丰富
网友 师***怡:说的好不如用的好,真心很好。越来越完美
网友 潘***丽:这里能在线转化,直接选择一款就可以了,用他这个转很方便的
网友 宓***莉:不仅速度快,而且内容无盗版痕迹。
网友 堵***格:OK,还可以
网友 訾***雰:下载速度很快,我选择的是epub格式
网友 步***青:。。。。。好
网友 濮***彤:好棒啊!图书很全
网友 冯***卉:听说内置一千多万的书籍,不知道真假的
网友 融***华:下载速度还可以