Hugendubel.info - Die B2B Online-Buchhandlung 

Merkliste
Die Merkliste ist leer.
Bitte warten - die Druckansicht der Seite wird vorbereitet.
Der Druckdialog öffnet sich, sobald die Seite vollständig geladen wurde.
Sollte die Druckvorschau unvollständig sein, bitte schliessen und "Erneut drucken" wählen.

Codes, Cryptology and Information Security

E-BookPDF1 - PDF WatermarkE-Book
408 Seiten
Englisch
Springer International Publishingerschienen am18.05.20231st ed. 2023
Verfügbare Formate
BuchKartoniert, Paperback
EUR85,59
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR53,49
E-BookPDF1 - PDF WatermarkE-Book
EUR85,59

Produkt

Details
Weitere ISBN/GTIN9783031330179
ProduktartE-Book
EinbandartE-Book
FormatPDF
Format Hinweis1 - PDF Watermark
FormatE107
Erscheinungsjahr2023
Erscheinungsdatum18.05.2023
Auflage1st ed. 2023
Reihen-Nr.13874
Seiten408 Seiten
SpracheEnglisch
IllustrationenXV, 408 p. 97 illus., 41 illus. in color.
Artikel-Nr.11462107
Rubriken
Genre9200

Inhalt/Kritik

Inhaltsverzeichnis
Invited Papers.- Cryptologists should not ignore the history of Al-Andalusia.- Compact Post-Quantum Signatures from Proofs of Knowledge leveraging Structure for the PKP, SD and RSD Problems.- On Catalan Constant Continued Fractions.- Cryptography.- Full Post-Quantum Datagram TLS Handshake in the Internet of Things.- Moderate Classical McEliece keys from quasi-Centrosymmetric Goppa codes.- QCB is Blindly Unforgeable.- A Side-Channel Secret Key Recovery Attack on CRYSTALS-Kyber Using k Chosen Ciphertexts.- A new keyed hash function based on Latin squares and error-correcting codes to authenticate users in smart home environments.- Attack on a Code-based Signature Scheme from QC-LDPC Codes.- Computational results on Gowers U2 and U3 norms of known S-Boxes.- Multi-Input Non-Interactive Functional Encryption: Constructions and Applications.- Indifferentiability of the Confusion-Diffusion Network and the Cascade Block Cipher.- Quantum Cryptanalysis of 5 rounds Feistel schemes and Benes schemes.- Lattice-based accumulator with constant time list update and constant time verification.- Information Security.- Malicious JavaScript detection based on AST analysis and key feature re-sampling in realistic environments.- Searching for Gemstones: Flawed Stegosystems May Hide Promising Ideas.- A Study for Security of Visual Cryptography.- Forecasting Click Fraud via Machine Learning Algorithms.- An Enhanced Anonymous ECC-based Authentication for Lightweight Application in TMIS.- Discrete Mathematics.- Symmetric 4-adic complexity of quaternary sequences with period 2p n.- Weightwise perfectly balanced functions and nonlinearity.- Chudnovsky-type algorithms over the projective line using generalized evaluation maps.- Coding Theory.- Security enhancement method using shortened error correcting codes.- An UpdatedDatabase of Z4 Codes and an Open Problem about Quasi-Cyclic Codes.mehr