+612 9045 4394
$7.95 Delivery per order to Australia and New Zealand
100% Australian owned
Over a hundred thousand in-stock titles ready to ship
Advances in Cryptology - CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, August 17-21, 2003, Proceedings : Lecture Notes in Computer Science - Dan Boneh

Advances in Cryptology - CRYPTO 2003 : 23rd Annual International Cryptology Conference, Santa Barbara, California, August 17-21, 2003, Proceedings

Lecture Notes in Computer Science

By: Dan Boneh (Editor)

Paperback ISBN: 9783540406747
Number Of Pages: 636

Share This Book:


or 4 easy payments of $51.04 with Learn more
Ships in 10 to 15 business days

Earn 408 Qantas Points
on this Book

Time-series data - data arriving in time order, or a data stream - can be found in fields such as physics, finance, music, networking, and medical instrumentation. Designing fast, scalable algorithms for analyzing single or multiple time series can yield scientific discoveries, medical diagnoses, and certainly profits. High Performance Discovery in Time Series presents rapid-discovery techniques for finding portions of time series with many events (i.e., gamma-ray scatterings) and finding closely related time series (i.e., highly correlated price histories, or musical melodies). Such real-time streaming data analysis is critical for complex real-world data in telecommunications, bioinformatics, and finance databases. This new monograph provides a technical survey of concepts and techniques for describing and analyzing large-scale time-series data streams. It offers essential coverage of the topic for database and online web services researchers and professionals, as well as an ideal resource for graduates.

Factoring Large Numbers with the TWIRL Devicep. 1
New Partial Key Exposure Attacks on RSAp. 27
Algebraic Cryptanalysis of Hidden Field Equation (HFE) Cryptosystems Using Grobner Basesp. 44
On Constructing Locally Computable Extractors and Cryptosystems in the Bounded Storage Modelp. 61
Unconditional Authenticity and Privacy from an Arbitrarily Weak Secretp. 78
On Cryptographic Assumptions and Challengesp. 96
Scalable Protocols for Authenticated Group Key Exchangep. 110
Practical Verifiable Encryption and Decryption of Discrete Logarithmsp. 126
Extending Oblivious Transfers Efficientlyp. 145
Algebraic Attacks on Combiners with Memoryp. 162
Fast Algebraic Attacks on Stream Ciphers with Linear Feedbackp. 176
Cryptanalysis of Safer++p. 195
A Polynomial Time Algorithm for the Braid Diffie-Hellman Conjugacy Problemp. 212
The Impact of Decryption Failures on the Security of NTRU Encryptionp. 226
Universally Composable Efficient Multiparty Computation from Threshold Homomorphic Encryptionp. 247
Universal Composition with Joint Statep. 265
Statistical Zero-Knowledge Proofs with Efficient Provers: Lattice Problems and Morep. 282
Derandomization in Cryptographyp. 299
On Deniability in the Common Reference String and Random Oracle Modelp. 316
Primality Proving via one Round in ECPP and One Iteration in AKSp. 338
Torus-Based Cryptographyp. 349
Efficient Universal Padding Technique for Multiplicative Trapdoor One-Way Permutationp. 366
Multipurpose Identity-Based Signcryption (A Swiss Army Knife for Identity-Based Cryptography)p. 383
SIGMA: The 'SIGn-and-MAc' Approach to Authenticated Diffie-Hellman and Its Use in the IKE Protocolsp. 400
On Memory-Bound Functions for Fighting Spamp. 426
Lower and Upper Bounds on Obtaining History Independencep. 445
Private Circuits: Securing Hardware against Probing Attacksp. 463
A Tweakable Enciphering Modep. 482
A Message Authentication Code Based on Unimodular Matrix Groupsp. 500
Luby-Rackoff: 7 Rounds Are Enough for 2[superscript n(1-[epsilon])] Securityp. 513
Weak Key Authenticity and the Computational Completeness of Formal Encryptionp. 530
Plaintext Awareness via Key Registrationp. 548
Relaxing Chosen-Ciphertext Securityp. 565
Password Interception in a SSL/TLS Channelp. 583
Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communicationp. 600
Making a Faster Cryptanalytic Time-Memory Trade-Offp. 617
Author Indexp. 631
Table of Contents provided by Blackwell. All Rights Reserved.

ISBN: 9783540406747
ISBN-10: 3540406743
Series: Lecture Notes in Computer Science
Audience: General
Format: Paperback
Language: English
Number Of Pages: 636
Publisher: Springer-Verlag Berlin and Heidelberg Gmbh & Co. Kg
Country of Publication: DE
Dimensions (cm): 23.39 x 15.6  x 3.3
Weight (kg): 0.89

Earn 408 Qantas Points
on this Book