Picture 1 of 12












Gallery
Picture 1 of 12












Advances in Cryptology Crypto 2003, D. Boneh, Lecture Notes in Computer Science
US $56.68
ApproximatelyEUR 49.85
or Best Offer
Condition:
“Paperback, 2003, The book is in Very Good Condition, but unfortunately I spilled a cup of coffe a ”... Read moreAbout condition
Good
A book that has been read, but is in good condition. Minimal damage to the book cover eg. scuff marks, but no holes or tears. If this is a hard cover, the dust jacket may be missing. Binding has minimal wear. The majority of pages are undamaged with some creasing or tearing, and pencil underlining of text, but this is minimal. No highlighting of text, no writing in the margins, and no missing pages. See the seller’s listing for full details and description of any imperfections.
Oops! Looks like we're having trouble connecting to our server.
Refresh your browser window to try again.
Postage:
US $13.49 (approx EUR 11.86) Economy Shipping from outside US.
Located in: Tel Aviv, Israel
Delivery:
Estimated between Tue, 3 Jun and Tue, 1 Jul to 43230
Returns:
30 days return. Buyer pays for return postage. If you use an eBay delivery label, it will be deducted from your refund amount.
Payments:
Shop with confidence
Seller assumes all responsibility for this listing.
eBay item number:135762986680
Item specifics
- Condition
- Good
- Seller notes
- Country/Region of Manufacture
- United States
- Educational Level
- Adult & Further Education
- Features
- 1st Edition
- Level
- Advanced, Technical
- ISBN
- 9783540406747
About this product
Product Identifiers
Publisher
Springer Berlin / Heidelberg
ISBN-10
3540406743
ISBN-13
9783540406747
eBay Product ID (ePID)
6025593
Product Key Features
Number of Pages
Xii, 636 Pages
Language
English
Publication Name
Advances in Cryptology - Crypto 2003 : 23rd Annual International Cryptology Conference Santa Barbara, California August 2003 Proceedings
Subject
Communication Studies, Operating Systems / General, Security / Cryptography, Networking / General, Security / General
Publication Year
2003
Type
Textbook
Subject Area
Computers, Language Arts & Disciplines
Series
Lecture Notes in Computer Science Ser.
Format
Trade Paperback
Dimensions
Item Weight
34.5 Oz
Item Length
9.3 in
Item Width
6.1 in
Additional Product Features
Intended Audience
Scholarly & Professional
Series Volume Number
2729
Number of Volumes
1 vol.
Illustrated
Yes
Table Of Content
Public Key Cryptanalysis I.- Factoring Large Numbers with the TWIRL Device.- New Partial Key Exposure Attacks on RSA.- Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Gröbner Bases.- Alternate Adversary Models.- On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Model.- Unconditional Authenticity and Privacy from an Arbitrarily Weak Secret.- Invited Talk I.- On Cryptographic Assumptions and Challenges.- Protocols.- Scalable Protocols for Authenticated Group Key Exchange.- Practical Verifiable Encryption and Decryption of Discrete Logarithms.- Extending Oblivious Transfers Efficiently.- Symmetric Key Cryptanalysis I.- Algebraic Attacks on Combiners with Memory.- Fast Algebraic Attacks on Stream Ciphers with Linear Feedback.- Cryptanalysis of Safer++.- Public Key Cryptanalysis II.- A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problem.- The Impact of Decryption Failures on the Security of NTRU Encryption.- Universal Composability.- Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryption.- Universal Composition with Joint State.- Zero-Knowledge.- Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and More.- Derandomization in Cryptography.- On Deniability in the Common Reference String and Random Oracle Model.- Algebraic Geometry.- Primality Proving via One Round in ECPP and One Iteration in AKS.- Torus-Based Cryptography.- Public Key Constructions.- Efficient Universal Padding Techniques for Multiplicative Trapdoor One-Way Permutation.- Multipurpose Identity-Based Signcryption.- Invited Talk II.- SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocols.- New Problems.- OnMemory-Bound Functions for Fighting Spam.- Lower and Upper Bounds on Obtaining History Independence.- Private Circuits: Securing Hardware against Probing Attacks.- Symmetric Key Constructions.- A Tweakable Enciphering Mode.- A Message Authentication Code Based on Unimodular Matrix Groups.- Luby-Rackoff: 7 Rounds Are Enough for 2 n(1????) Security.- New Models.- Weak Key Authenticity and the Computational Completeness of Formal Encryption.- Plaintext Awareness via Key Registration.- Relaxing Chosen-Ciphertext Security.- Symmetric Key Cryptanalysis II.- Password Interception in a SSL/TLS Channel.- Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication.- Making a Faster Cryptanalytic Time-Memory Trade-Off.
Synopsis
Crypto 2003, the 23rd Annual Crypto Conference, was sponsored by the Int- national Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference received 169 submissions, of which the program committee selected 34 for presentation. These proceedings contain the revised versions of the 34 submissions that were presented at the conference. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. Submissions to the conference represent cutti- edge research in the cryptographic community worldwide and cover all areas of cryptography. Many high-quality works could not be accepted. These works will surely be published elsewhere. The conference program included two invited lectures. Moni Naor spoke on cryptographic assumptions and challenges. Hugo Krawczyk spoke on the 'SI- and-MAc'approachtoauthenticatedDi'e-HellmananditsuseintheIKEpro- cols. The conference program also included the traditional rump session, chaired by Stuart Haber, featuring short, informal talks on late-breaking research news. Assembling the conference program requires the help of many many people. To all those who pitched in, I am forever in your debt. I would like to ?rst thank the many researchers from all over the world who submitted their work to this conference. Without them, Crypto could not exist. I thank Greg Rose, the general chair, for shielding me from innumerable logistical headaches, and showing great generosity in supporting my e'orts.
LC Classification Number
QA268
Item description from the seller
About this seller
Eden's Books
100% positive Feedback•559 items sold
Registered as a private sellerThereby, consumer rights stemming from EU consumer protection law do not apply. eBay buyer protection still applies to most purchases.
Popular categories from this shop
Seller Feedback (140)
- n***s (641)- Feedback left by buyer.Past monthVerified purchaseGreat seller
- n***f (138)- Feedback left by buyer.Past 6 monthsVerified purchaseExcellent condition, would buy from again
- n***f (138)- Feedback left by buyer.Past 6 monthsVerified purchaseExcellent condition, would buy from again
More to explore:
- Computer Science Textbooks and Education Books,
- Computer Science Textbook Adult Learning & University Books,
- Workbook Computer Science Adult Learning & University Books,
- Science Magazines,
- Computer Science Paperback Adult Learning & University Books,
- Science Fiction & Non-Fiction Books,
- Childrens Science & Technology Books,
- Science Dictionaries & Reference Books,
- I-D Magazines,
- Science Fiction Monthly Magazines