39,99 €
inkl. MwSt.
Versandkostenfrei*
Versandfertig in 1-2 Wochen
payback
20 °P sammeln
  • Broschiertes Buch

This book constitutes the refereed proceedings of the 19th Annual International Cryptology Conference, CRYPTO '99, held in Santa Barbara, California in August 1999.The 38 revised full papers presented were carefully reviewed and selected from a total of 167 submissions. Also included is an invited survey paper. The papers are organized in topical sections on public-key cryptanalysis, secure communication and computation, distributed cryptography, secret-key cryptography, message authentication codes, traitor tracing, differential power analysis, signature schemes, zero knowledge, asymmetric…mehr

Produktbeschreibung
This book constitutes the refereed proceedings of the 19th Annual International Cryptology Conference, CRYPTO '99, held in Santa Barbara, California in August 1999.The 38 revised full papers presented were carefully reviewed and selected from a total of 167 submissions. Also included is an invited survey paper. The papers are organized in topical sections on public-key cryptanalysis, secure communication and computation, distributed cryptography, secret-key cryptography, message authentication codes, traitor tracing, differential power analysis, signature schemes, zero knowledge, asymmetric encryption, electronic cash, and protocols and broadcasting.
Crypto '99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Barbara (UCSB). The General Chair, Donald Beaver, was responsible for local organization and registration. The Program Committee considered 167 papers and selected 38 for presentation. This year's conference program also included two invited lectures. I was pleased to include in the program UeliM aurer's presentation "Information Theoretic Cryptography" and Martin Hellman's presentation "The Evolution of Public Key Cryptography." The program also incorporated the traditional Rump Session for informal short presentations of new results, run by Stuart Haber. These proceedings include the revised versions of the 38 papers accepted by the Program Committee. These papers were selected from all the submissions to the conference based on originality, quality, and relevance to the field of cryptology. Revisions were not checked, and the authors bear full responsibility for the contents of their papers.