EUR 56,91 gastos de envío desde Estados Unidos de America a España
Destinos, gastos y plazos de envíoEUR 4,72 gastos de envío desde Reino Unido a España
Destinos, gastos y plazos de envíoLibrería: Ria Christie Collections, Uxbridge, Reino Unido
Condición: New. In. Nº de ref. del artículo: ria9781475706048_new
Cantidad disponible: Más de 20 disponibles
Librería: moluna, Greven, Alemania
Condición: New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structu. Nº de ref. del artículo: 4206850
Cantidad disponible: Más de 20 disponibles
Librería: AHA-BUCH GmbH, Einbeck, Alemania
Taschenbuch. Condición: Neu. Druck auf Anfrage Neuware - Printed after ordering - Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip. Nº de ref. del artículo: 9781475706048
Cantidad disponible: 1 disponibles
Librería: THE SAINT BOOKSTORE, Southport, Reino Unido
Paperback / softback. Condición: New. This item is printed on demand. New copy - Usually dispatched within 5-9 working days 584. Nº de ref. del artículo: C9781475706048
Cantidad disponible: Más de 20 disponibles
Librería: buchversandmimpf2000, Emtmannsberg, BAYE, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - Print on Demand Titel. Neuware -Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip.Springer Verlag GmbH, Tiergartenstr. 17, 69121 Heidelberg 348 pp. Englisch. Nº de ref. del artículo: 9781475706048
Cantidad disponible: 1 disponibles
Librería: Revaluation Books, Exeter, Reino Unido
Paperback. Condición: Brand New. 346 pages. 9.61x6.69x0.79 inches. In Stock. Nº de ref. del artículo: x-1475706049
Cantidad disponible: 2 disponibles
Librería: BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Alemania
Taschenbuch. Condición: Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -Algorithms and Theory.- Fast Computation of Discrete Logarithms in GF (q).- Some Remarks on the Herlestam-Johannesson Algorithm for Computing Logarithms over GF(2p).- A Public-Key Cryptosystem Based on the Matrix Cover NP-Complete Problem.- Infinite Structures in Information Theory.- A Fast Modular Multiplication Algorithm with Application to Two Key Cryptography.- Comparison of Two Pseudo-Random Number Generators.- On Computationally Secure Authentication Tags Requiring Short Secret Shared Keys.- Modes of Operation.- Some Regular Properties of the ¿Data Encryption Standard¿ Algorithm.- The Average Cycle Size of the Key Stream in Output Feedback Encipherment.- Analysis of Certain Aspects of Output Feedback Mode.- Drainage and the DES Summary.- Security of a Keystream Cipher with Secret Initial Value.- Using Data Uncertainty to Increase the Crypto-Complexity of Simple Private Key Enciphering Schemes.- Randomized Encryption Techniques.- Protocols and Transaction Security.- On the Security of Multi-Party Protocols in Distributed Systems.- On the Security of Ping-Pong Protocols.- The Use of Public-Key Cryptography for Signing Checks.- Blind Signatures for Untraceable Payments.- A Randomized Protocol for Signing Contracts.- On Signatures and Authentication.- Applications.- Cryptographic Protection of Personal Data Cards.- Non-Public Key Distribution.- Cryptographic Solution to a Multilevel Security Problem.- Local Network Cryptosystem Architecture: Access Control.- Implementing an Electronic Notary Public.- Quantum Cryptography, or Unforgeable Subway Tokens.- Special Session on Cryptanalysis.- A Polynomial Time Algorithm for Breaking the Basic Merkle-Hellman Cryptosystem.- A Preliminary Report on the Cryptanalysis of Merkle-Hellman Knapsack Cryptosystems.- On Breaking the Iterated Merkle-Hellman Public-Key Cryptosystem.- Rump Session: Impromptu Talks by Conference Attendees.- Long Key Variants of DES.- On the Security of Multi-Party Ping-Pong Protocols.- Inferring a Sequence Generated by a Linear Congruence.- Key Reconstruction.- Nondeterministic Cryptography.- A Short Report on the RSA Chip. 348 pp. Englisch. Nº de ref. del artículo: 9781475706048
Cantidad disponible: 2 disponibles
Librería: Chiron Media, Wallingford, Reino Unido
PF. Condición: New. Nº de ref. del artículo: 6666-IUK-9781475706048
Cantidad disponible: 10 disponibles
Librería: Lucky's Textbooks, Dallas, TX, Estados Unidos de America
Condición: New. Nº de ref. del artículo: ABLIING23Mar2716030093098
Cantidad disponible: Más de 20 disponibles
Librería: Singing Saw Books, Portland, OR, Estados Unidos de America
Hardcover. Condición: Good. First Edition. FIRST EDITION. Includes the article "Blind Signatures for Untraceable Payments" by David Chaum, an innovator of blockchain technology. Ex-library copy, hardcover, lacking jacket. Typical library markings, call number on spine. Uncommon. Nº de ref. del artículo: 131133390
Cantidad disponible: 1 disponibles