Anbieter: Buchpark, Trebbin, Deutschland
Zustand: Sehr gut. Zustand: Sehr gut | Sprache: Englisch | Produktart: Bücher.
Verlag: Springer Berlin Heidelberg, 2005
ISBN 10: 3540306846 ISBN 13: 9783540306849
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 48,37
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Verlag: Springer Berlin Heidelberg, 2000
ISBN 10: 3540414525 ISBN 13: 9783540414520
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 48,37
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New.
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Nov 2005, 2005
ISBN 10: 3540306846 ISBN 13: 9783540306849
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -Asiacrypt, the annual conference of cryptology sponsored by IACR is now 11 years old. Asiacrypt 2005 was held during December 4¿8, 2005, at Hotel Taj Coromandel,Chennai,India.This conferencewasorganizedby theInternational Association for Cryptologic Research (IACR) in cooperation with the Indian Institute of Technology (IIT), Chennai. Thisyearatotalof237papersweresubmittedtoAsiacrypt2005.Thesubm- sionscoveredallareasofcryptographicresearchrepresentingthecurrentstateo f work in the crypto community worldwide. Each paper was blind reviewed by at least three members of the Program Committee and papers co-authored by the PC members were reviewed by at least six members. This rst phase of review by the PC members was followed by a detailed discussion on the papers. At the end of the reviewing process 37 papers were accepted and were presented at the conference. The proceedings contain the revised versionsof the accepted papers. In addition we were fortunate to have Prof. Andrew Yao and Prof. Bart Preneel as invited speakers. Based on a discussion and subsequent voting among the PC members, the Best Paper Award for this year¿s Asiacrypt was conferred to Pascal Paillier and Damien Vergnaud for the paper entitled ¿Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log.¿ I would like to thank the following people. First, the General Chair, Prof.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 724 pp. Englisch.
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Nov 2000, 2000
ISBN 10: 3540414525 ISBN 13: 9783540414520
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -The field of Cryptology witnessed a revolution in the late seventies. Since then it has been expanded into an important and exciting area of research. Over the last two decades, India neither participated actively nor did it contribute sig nificantly towards the development in this field. However, recently a number of active research groups engaged in important research and developmental work have crystalized in different parts of India. As a result, their interaction with the international crypto community has become necessary. With this backdrop, it was proposed that a conference on cryptology - INDOCRYPT, be organized for the first time in India. The Indian Statistical Institute was instrumental in hosting this conference. INDOCRYPT has generated a large amount of enthu siasm amongst the Indians as well as the International crypto communities. An INDOCRYPT steering committee has been formed and the committee has plans to make INDOCRYPT an annual event. For INDOCRYPT 2000, the program committee considered a total of 54 pa pers and out of these 25 were selected for presentation. The conference program also included two invited lectures by Prof. Adi Shamir and Prof. Eli Biham. These proceedings include the revised versions of the 25 papers accepted by the program committee. These papers were selected from all the submissions based on originality, quality and relevance to the field of Cryptology. Revisions were not checked and the authors bear the full responsibility for the contents of the papers in these proceedings. 312 pp. Englisch.
Verlag: Springer Berlin Heidelberg, 2005
ISBN 10: 3540306846 ISBN 13: 9783540306849
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - Asiacrypt, the annual conference of cryptology sponsored by IACR is now 11 years old. Asiacrypt 2005 was held during December 4 8, 2005, at Hotel Taj Coromandel,Chennai,India.This conferencewasorganizedby theInternational Association for Cryptologic Research (IACR) in cooperation with the Indian Institute of Technology (IIT), Chennai. Thisyearatotalof237papersweresubmittedtoAsiacrypt2005.Thesubm- sionscoveredallareasofcryptographicresearchrepresentingthecurrentstateof work in the crypto community worldwide. Each paper was blind reviewed by at least three members of the Program Committee and papers co-authored by the PC members were reviewed by at least six members. This rst phase of review by the PC members was followed by a detailed discussion on the papers. At the end of the reviewing process 37 papers were accepted and were presented at the conference. The proceedings contain the revised versionsof the accepted papers. In addition we were fortunate to have Prof. Andrew Yao and Prof. Bart Preneel as invited speakers. Based on a discussion and subsequent voting among the PC members, the Best Paper Award for this year s Asiacrypt was conferred to Pascal Paillier and Damien Vergnaud for the paper entitled Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log. I would like to thank the following people. First, the General Chair, Prof.
Verlag: Springer Berlin Heidelberg, 2000
ISBN 10: 3540414525 ISBN 13: 9783540414520
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 53,49
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The field of Cryptology witnessed a revolution in the late seventies. Since then it has been expanded into an important and exciting area of research. Over the last two decades, India neither participated actively nor did it contribute sig nificantly towards the development in this field. However, recently a number of active research groups engaged in important research and developmental work have crystalized in different parts of India. As a result, their interaction with the international crypto community has become necessary. With this backdrop, it was proposed that a conference on cryptology - INDOCRYPT, be organized for the first time in India. The Indian Statistical Institute was instrumental in hosting this conference. INDOCRYPT has generated a large amount of enthu siasm amongst the Indians as well as the International crypto communities. An INDOCRYPT steering committee has been formed and the committee has plans to make INDOCRYPT an annual event. For INDOCRYPT 2000, the program committee considered a total of 54 pa pers and out of these 25 were selected for presentation. The conference program also included two invited lectures by Prof. Adi Shamir and Prof. Eli Biham. These proceedings include the revised versions of the 25 papers accepted by the program committee. These papers were selected from all the submissions based on originality, quality and relevance to the field of Cryptology. Revisions were not checked and the authors bear the full responsibility for the contents of the papers in these proceedings.
Verlag: Springer, Berlin, Springer Berlin Heidelberg, Springer, 2009
ISBN 10: 3642106277 ISBN 13: 9783642106279
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 59,27
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book constitutes the refereed proceedings of the 10th International Conference on Cryptology in India, INDOCRYPT 2009, held in New Dehli, India, in December 2009.The 28 revised full papers were carefully reviewed and selected from 104 submissions. The papers are organized in topical sections on post-quantum cryptology, key agreement protocols, side channel attacks, symmetric cryptology, hash functions, number theoretic cryptology, lightweight cryptology, signature protocols, and multiparty computation.
Verlag: Springer Verlag, New York, 2000
ISBN 10: 3540414525 ISBN 13: 9783540414520
Sprache: Englisch
Anbieter: Doss-Haus Books, Redondo Beach, CA, USA
EUR 19,65
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. No Jacket. Hardcover 2000 library bound edition. Ex-library book with minimal stamps and labels attached. Binding firm. Pages unmarked and clean. Laminated covers and text in very good to near fine condition. Series: Lecture Notes in Computer Science ;1977. [x, 294 p. ; 24 cm].
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 58,18
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,18
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 60,18
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In English.
Verlag: Springer Verlag, New York, 2004
ISBN 10: 3540221719 ISBN 13: 9783540221715
Sprache: Englisch
Anbieter: Doss-Haus Books, Redondo Beach, CA, USA
EUR 45,86
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbHardcover. Zustand: Very Good. No Jacket. Hardcover 2004 library bound edition. Ex-library book with stamps and labels attached. Binding firm. Pages unmarked and clean. Laminated covers and text in very good condition. Series: Lecture Notes in Computer Science ;3017. [xi, 484 p. : fig., tab. ; 24 cm].
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 80,04
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 442 pages. 9.00x6.00x0.75 inches. In Stock.
Verlag: Springer Berlin Heidelberg, 2004
ISBN 10: 3540221719 ISBN 13: 9783540221715
Sprache: Englisch
Anbieter: moluna, Greven, Deutschland
EUR 92,27
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbKartoniert / Broschiert. Zustand: New.
Verlag: Springer-Verlag New York Inc, 2006
ISBN 10: 3540306846 ISBN 13: 9783540306849
Sprache: Englisch
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 83,34
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbPaperback. Zustand: Brand New. 1st edition. 701 pages. 9.75x6.25x1.25 inches. In Stock.
Verlag: Springer Berlin Heidelberg, Springer Berlin Heidelberg Jun 2004, 2004
ISBN 10: 3540221719 ISBN 13: 9783540221715
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 106,99
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -2.1 Di erential Power Analysis Di erential Power Analysis (DPA) was introduced by Kocher, Ja e and Jun in 1998 [13] and published in 1999 [14]. The basic idea is to make use of potential correlations between the data handled by the micro-controller and the electric consumption measured values. Since these correlations are often very low, s- tistical methods must be applied to deduce su cient information from them. Theprinciple ofDPAattacksconsistsincomparingconsumptionvalues m- suredonthe real physical device (for instance a GSM chip or a smart card)with values computed in an hypothetical model of this device (the hypotheses being made among others on the nature of the implementation, and chie y on a part of the secret key). By comparing these two sets of values, the attacker tries to recover all or part of the secret key. The initial target of DPA attacks was limited to symmetric algorithms. V- nerability of DES ¿ rst shown by Kocher, Ja e and Jun [13, 14]¿wasfurther studied by Goubin and Patarin [11, 12], Messerges, Dabbish, Sloan [16]and Akkar, B¿ evan, Dischamp, Moyart [2]. Applications of these attacks were also largely taken into account during the AES selection process, notably by Biham, Shamir [4], Chari, Jutla, Rao, Rohatgi [5] and Daemen, Rijmen [8].Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 504 pp. Englisch.
Verlag: Springer Berlin Heidelberg, 2004
ISBN 10: 3540221719 ISBN 13: 9783540221715
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 106,99
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - 2.1 Di erential Power Analysis Di erential Power Analysis (DPA) was introduced by Kocher, Ja e and Jun in 1998 [13] and published in 1999 [14]. The basic idea is to make use of potential correlations between the data handled by the micro-controller and the electric consumption measured values. Since these correlations are often very low, s- tistical methods must be applied to deduce su cient information from them. Theprinciple ofDPAattacksconsistsincomparingconsumptionvalues m- suredonthe real physical device (for instance a GSM chip or a smart card)with values computed in an hypothetical model of this device (the hypotheses being made among others on the nature of the implementation, and chie y on a part of the secret key). By comparing these two sets of values, the attacker tries to recover all or part of the secret key. The initial target of DPA attacks was limited to symmetric algorithms. V- nerability of DES rst shown by Kocher, Ja e and Jun [13, 14] wasfurther studied by Goubin and Patarin [11, 12], Messerges, Dabbish, Sloan [16]and Akkar, B evan, Dischamp, Moyart [2]. Applications of these attacks were also largely taken into account during the AES selection process, notably by Biham, Shamir [4], Chari, Jutla, Rao, Rohatgi [5] and Daemen, Rijmen [8].
Anbieter: Ria Christie Collections, Uxbridge, Vereinigtes Königreich
EUR 111,47
Währung umrechnenAnzahl: Mehr als 20 verfügbar
In den WarenkorbZustand: New. In.
EUR 143,90
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbZustand: New. pp. 504 Illus.
EUR 206,33
Währung umrechnenAnzahl: 5 verfügbar
In den WarenkorbZustand: new.
Anbieter: PBShop.store UK, Fairford, GLOS, Vereinigtes Königreich
EUR 226,67
Währung umrechnenAnzahl: 5 verfügbar
In den WarenkorbHRD. Zustand: New. New Book. Shipped from UK. Established seller since 2000.
Verlag: Springer Nature Singapore, Springer Nature Singapore Okt 2024, 2024
ISBN 10: 9819922313 ISBN 13: 9789819922314
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 246,09
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 ¿ 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 484 pp. Englisch.
Verlag: Springer Nature Singapore, Springer Nature Singapore Okt 2023, 2023
ISBN 10: 9819922283 ISBN 13: 9789819922284
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 246,09
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbBuch. Zustand: Neu. Neuware -The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 ¿ 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 484 pp. Englisch.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 252,48
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 254,40
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2022), organized by PSIT, Kanpur, India during 16 - 18 December 2022. This conference proceeding will provide the understanding of core concepts of Cryptology & Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post quantum cryptography, lattice based cryptography, non-commutative ring based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial based cryptography, code based cryptography, NTRU cryptosystems, security and privacy in machine learning, block chain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Anbieter: Revaluation Books, Exeter, Vereinigtes Königreich
EUR 260,53
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbHardcover. Zustand: Brand New. 450 pages. 9.26x6.11 inches. In Stock.
Verlag: Springer Nature Singapore, Springer Nature Singapore Apr 2024, 2024
ISBN 10: 9819706408 ISBN 13: 9789819706402
Sprache: Englisch
Anbieter: buchversandmimpf2000, Emtmannsberg, BAYE, Deutschland
EUR 267,49
Währung umrechnenAnzahl: 2 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Neuware -The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27¿29 October 2023. This conference proceeding provides the understanding of core concepts of Cryptology and Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post-quantum cryptography, lattice based cryptography, non-commutative ring-based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial-based cryptography, code-based cryptography, NTRU cryptosystems, security and privacy in machine learning, blockchain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 908 pp. Englisch.
Verlag: Springer Nature Singapore, Springer Nature Singapore, 2024
ISBN 10: 9819706408 ISBN 13: 9789819706402
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 272,34
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbTaschenbuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - The book features original papers from International Conference on Cryptology & Network Security with Machine Learning (ICCNSML 2023), organized by PSIT, Kanpur, India during 27-29 October 2023. This conference proceeding provides the understanding of core concepts of Cryptology and Network Security with ML in data communication. The book covers research papers in public key cryptography, elliptic curve cryptography, post-quantum cryptography, lattice based cryptography, non-commutative ring-based cryptography, cryptocurrency, authentication, key agreement, Hash functions, block/stream ciphers, polynomial-based cryptography, code-based cryptography, NTRU cryptosystems, security and privacy in machine learning, blockchain, IoT security, wireless security protocols, cryptanalysis, number theory, quantum computing, cryptographic aspects of network security, complexity theory, and cryptography with machine learning.
Verlag: Springer Nature Singapore, Springer Nature Singapore, 2025
ISBN 10: 9819632552 ISBN 13: 9789819632558
Sprache: Englisch
Anbieter: AHA-BUCH GmbH, Einbeck, Deutschland
EUR 279,40
Währung umrechnenAnzahl: 1 verfügbar
In den WarenkorbBuch. Zustand: Neu. Druck auf Anfrage Neuware - Printed after ordering - This book presents high-quality research papers presented at International Conference on Mathematics and Logics in Computer Science (ICMLCS 2024) held at Allenhouse Institute of Technology, Kanpur, India, during August 30-31, 2024. The book covers recent research in data science, network security, theory of computing, network security, cloud computing, coding theory, linear algebra and its applications in machine learning, artificial intelligence, block chain, deep learning, graph theory, cryptography, cyber security, internet of things, quantum computing, and steganography.