feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Subjects(RVK)
Access
  • 1
    UID:
    b3kat_BV041962361
    Format: 1 Online-Ressource
    ISBN: 9783540060352
    Series Statement: Lecture notes in mathematics 292
    Additional Edition: Erscheint auch als Druckausgabe ISBN 978-3-540-37994-2
    Language: English
    Subjects: Mathematics
    RVK:
    Keywords: Kombinatorik
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (Deutschlandweit zugänglich)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    b3kat_BV044660575
    Format: 1 Online-Ressource (XXIII, 453 Seiten, 10 illus)
    ISBN: 9783319590325
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 978-3-319-59031-8
    Language: English
    URL: Volltext  (URL des Erstveröffentlichers)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    almafu_BV006272726
    Format: 508 Seiten : , Illustrationen.
    ISBN: 3-540-06035-9 , 0-387-06035-9
    Series Statement: Lectures notes in mathematics 292
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-540-06035-2
    Language: English
    Subjects: Mathematics
    RVK:
    Keywords: Kombinatorik
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    gbv_595126197
    Format: Online-Ressource (XIII, 542 S.)
    Edition: Online-Ausg. Berlin [u.a.] Springer 2006 Springer lecture notes archive
    ISBN: 9783540479765
    Series Statement: Lecture notes in computer science 718
    Content: Threshold cryptosystems -- Authentication codes with perfect protection -- Practical proven secure authentication with arbitration -- Authentication codes under impersonation attack -- Cumulative arrays and geometric secret sharing schemes -- Nonperfect secret sharing schemes -- A construction of practical secret sharing schemes using linear block codes -- HAVAL — A one-way hashing algorithm with variable length of output (extended abstract) -- On the power of memory in the design of collision resistant hash functions -- A practical digital multisignature scheme based on discrete logarithms (extended abstract) -- Group-oriented undeniable signature schemes without the assistance of a mutually trusted party -- Highly nonlinear 0–1 balanced boolean functions satisfying strict avalanche criterion (extended abstract) -- Linear nonequivalence versus nonlinearity -- Constructing large cryptographically strong S-boxes -- Nonasymptotic estimates of information protection efficiency for the wire-tap channel concept -- Cryptanalysis of LOKI 91 -- Cryptanalysis of summation generator -- Secure addition sequence and its applications on the server-aided secret computation protocols -- Subliminal channels for signature transfer and their application to signature distribution schemes -- A practical secret voting scheme for large scale elections -- Privacy for multi-party protocols -- New protocols for electronic money -- Modelling and analyzing cryptographic protocols using Petri nets -- On verifiable implicit asking protocols for RSA computation -- Modified Maurer-Yacobi's scheme and its applications -- The vulnerability of geometric sequences based on fields of odd characteristic -- A fast cryptographic checksum algorithm based on stream ciphers -- An approach to the initial state reconstruction of a clock-controlled shift register based on a novel distance measure -- Construction of m-ary de Bruijn sequences (extended abstract) -- Information technology security standards — An Australian perspective -- Non-interactive generation of shared pseudorandom sequences -- A generalized description of DES-based and Benes-based permutationgenerators -- Prime generation with the Demytko-Miller-Trbovich algorithm -- Constructions of feebly-one-way families of permutations -- On bit correlations among preimages of “Many to one” One-way functions -- The fast cascade exponentiation algorithm and its applications on cryptography -- The design of a conference key distribution system -- Remarks on “The design of a Conference Key Distribution System” -- Public-key cryptosystem based on the discrete logarithm problem -- Elliptic curves over F p suitable for cryptosystems -- The probability Distribution of the Diffie-Hellman Key -- A modular exponentiation unit based on systolic arrays -- A comparison of key distribution patterns constructed from circle geometries -- A block cipher method using combinations of different methods under the control of the user key -- An attack on two hash functions by Zheng-Matsumoto-Imai -- Primality testing with Lucas functions.
    Content: This book contains the proceedings of AUSCRYPT '92, an international conference on cryptologic research held on the Gold Coast, Australia, in December 1992. This is the third conference held outside the series of CRYPTO meetings held in Santa Barbara, California, each August and EUROCRYPT meetings held in European countries each northern spring. The first two were AUSCRYPT '90, held in Australia, and ASIACRYPT '91, held in Japan. The volume contains three invited papers and 44 contributed papers selected from 77 submissions. The articles cover all main topics in modern computer and communications security research.These include: - authentication - secret sharing - digital signatures - one-way hashing functions - design of block ciphers - cryptanalysis - cryptographic protocols - pseudo-random sequences and functions - public key cryptography.
    Note: Literaturangaben
    Additional Edition: ISBN 3540572201
    Additional Edition: ISBN 9783540572206
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783662215159
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9783540572206
    Language: English
    Keywords: Kryptologie ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_595128750
    Format: Online-Ressource (IX, 462 S.)
    Edition: Online-Ausg. Berlin [u.a.] Springer 2006 Springer lecture notes archive
    ISBN: 9783540462972
    Series Statement: Lecture notes in computer science 453
    Content: The implementation of elliptic curve cryptosystems -- Direct demonstration of the power to break public-key cryptosystems -- Continued fractions and the Berlekamp-Massey algorithm -- Nonlinear generators of binary sequences with controllable complexity and double key -- K-M sequence is forwardly predictable -- Lower bounds on the weight complexities of cascaded binary sequences -- Secure user access control for public networks -- Formal specification and verification of secure communication protocols -- Network security policy models -- KEYMEX: An expert system for the design of key management schemes -- On the formal analysis of PKCS authentication protocols -- Some remarks on authentication systems -- Meet-in-the-middle attack on digital signature schemes -- A binary sequence generator based on Ziv-Lempel source coding -- A fast iterative algorithm for a shift register initial state reconstruction given the noisy output sequence -- Parallel generation of pseudo-random sequences -- Large primes in stream cipher cryptography -- Comparison of block ciphers -- Key scheduling in des type cryptosystems -- LOKI — A cryptographic primitive for authentication and secrecy applications -- Permutation generators of alternating groups -- Showing credentials without identification transferring signatures between unconditionally unlinkable pseudonyms -- A (non-practical) three-pass identification protocol using coding theory -- Demonstrating possession without revealing factors and its application -- Anonymous one-time signatures and flexible untraceable electronic cash -- Dyadic matrices and their potential significance in cryptography (abstract) -- A note on strong Fibonacci pseudoprimes -- On the significance of the directed acyclic word graph in cryptology -- Solving equations in sequences -- The practical application of state of the art security in real environments -- RSA as a benchmark for multiprocessor machines -- Range equations and range matrices: a study in statistical database security -- Record encryption in distributed databases -- VLSI design for exponentiation in GF(2n) -- A fast modular-multiplication module for smart cards -- Minòs: Extended user authentication -- Universal logic sequences -- The three faces of information security -- Secure cryptographic initialisation of remote terminals in an electronic funds transfer/point of sale system.
    Content: This volume is a collection of refereed papers presented during AUSCRYPT '90 held in Sydney, Australia, January 8-11, 1990. This was the first conference of a series sponsored by the International Association for Cryptological Research (IACR) in addition to the EUROCRYPT series held in European countries and the CRYPTO series held in Santa Barbara, California. The volume is divided into sections on: - Public-key cryptosystems - Pseudorandomness and sequences - Network security - Authentication - Block ciphers - Zero-knowledge protocols - Theory - Applications - Implementations. It is a "must" for all researchers and students interested in recent progress in cryptology.
    Note: Literaturangaben
    Additional Edition: ISBN 3540530002
    Additional Edition: ISBN 9783540530008
    Additional Edition: Erscheint auch als Druck-Ausgabe Advances in cryptology - AUSCRYPT '90 Berlin : Springer, 1990 ISBN 3540530002
    Additional Edition: ISBN 0387530002
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    Keywords: Kryptologie ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Hoboken, NJ :Wiley, John Wiley & Sons, Inc.,
    UID:
    almafu_9959663370702883
    Format: 1 online resource (xxx, 321 pages) : , illustrations (some color)
    ISBN: 9781119520139 , 1119520134 , 1119520274 , 9781119520276 , 9781119520252 , 1119520258
    Content: "This book, which is the update of a 1992 survey by the same authors, summarizes some known constructions of Hadamard Matrices that are based on algebraic and number theoretic methods. Hadamard matrices are of practical use in signal processing and design experiments among other applications. This book begins with basic definitions, and is followed by a chapter on Gauss sums, Jacobi sums and relative Gauss sums. Next, the authors discuss plug-in matrices, arrays, and sequences. M-structure is covered next, along with Menon Hadamard differences sets and regular Handmard matrices. The authors then discuss Paley difference sets, skew-Handmard matrices, and skew Handmard differences sets. Finally, the book concludes with a discussion of asymptotic existence of Handmard matrices and more on maximal determinant matrices"--
    Note: Introduction -- Chapter 1 Basic Definitions -- Chapter 2 Gauss Sums, Jacobi Sums, and Relative Gauss Sums -- Chapter 3 Plug-In Matrices -- Chapter 4 Arrays: Matrices to Plug-Into -- Chapter 5 Sequences -- Chapter 6 M-structures -- Chapter 7 Menon Hadamard Difference Sets and Regular Hadamard Matrices -- Chapter 8 Paley Hadamard Difference Sets and Paley Type Partial Difference Sets -- Chapter 9 Skew Hadamard, Amicable, and Symmetric Matrices -- Chapter 10 Skew Hadamard Difference Sets -- Chapter 11 Asymptotic Existence of Hadamard Matrices -- Chapter 12 More on Maximal Determinant Matrices -- Appendix A Hadamard Matrices -- Appendix B List of sds from Cyclotomy -- Appendix C Further Research Questions -- References -- Index.
    Additional Edition: Print version: Seberry, Jennifer, 1944- Hadamard matrices Hoboken, NJ : Wiley, 2020. ISBN 9781119520245
    Language: English
    Keywords: Electronic books. ; Electronic books. ; Electronic books. ; Electronic books. ; Electronic books. ; Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_BV006272726
    Format: 508 Seiten : , Illustrationen.
    ISBN: 3-540-06035-9 , 0-387-06035-9
    Series Statement: Lectures notes in mathematics 292
    Additional Edition: Erscheint auch als Online-Ausgabe ISBN 978-3-540-06035-2
    Language: English
    Subjects: Mathematics
    RVK:
    Keywords: Kombinatorik
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    gbv_424000121
    Format: IX, 353 S. 8"
    Series Statement: (Lecture notes in mathematics 686)
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    gbv_022665706
    Format: IX, 462 S. , graph. Darst.
    ISBN: 3540530002 , 0387530002
    Series Statement: Lecture notes in computer science 453
    Note: Literaturangaben
    Additional Edition: Online-Ausg. Advances in cryptology - AUSCRYPT '90 Berlin [u.a.] : Springer, 1990 ISBN 9783540462972
    Additional Edition: Erscheint auch als Online-Ausgabe Seberry, Jennifer, 1944 - Advances in Cryptology - AUSCRYPT '90 Berlin, Heidelberg : Springer Berlin Heidelberg, 1990 ISBN 9783540462972
    Language: English
    Subjects: Computer Science , Mathematics
    RVK:
    RVK:
    Keywords: Kryptologie ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    Book
    Book
    Laguna Hills, Cal. : Aegean Park Pr.
    UID:
    gbv_018097464
    Format: VI,178 S
    ISBN: 0894121502 , 0894121510
    Series Statement: Public key cryptography 50
    Language: Undetermined
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages