feed icon rss

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    UID:
    almahu_BV019643323
    Format: XVI, 546 S. : , Ill., graph. Darst.
    ISBN: 3-540-23975-8
    Series Statement: Lecture Notes in Computer Science 3329
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Kryptologie ; Kryptosystem ; Konferenzschrift ; Kongress ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    UID:
    almahu_BV035434268
    Format: XIII, 431 S. : , Ill., graph. Darst. ; , 235 mm x 155 mm.
    ISBN: 978-3-642-00729-3 , 3-642-00729-5
    Series Statement: Lecture notes in computer science 5461
    Note: Literaturangaben
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Chiffrierung ; Kryptologie ; Kryptoanalyse ; Rechnernetz ; Datensicherung ; Computersicherheit ; Authentifikation ; Digital Rights Management ; Privatsphäre ; Konferenzschrift ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    UID:
    gbv_361726236
    Format: XI, 536 S. , Ill., graph. Darst.
    ISBN: 3540007164
    Series Statement: Lecture notes in computer science 2587
    Note: Literaturangaben
    Additional Edition: Erscheint auch als Online-Ausgabe Lee, Pil Joong Information Security and Cryptology — ICISC 2002 Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2003 ISBN 9783540365525
    Additional Edition: ISBN 3540007164
    Language: English
    Subjects: Computer Science
    RVK:
    RVK:
    RVK:
    Keywords: Kryptologie ; Kryptosystem ; Public-Key-Kryptosystem ; Kryptologie ; Kryptosystem ; Elektronische Unterschrift ; Stromchiffre ; Konferenzschrift ; Kongress ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    UID:
    b3kat_BV035439539
    Format: 1 Online-Ressource (XIII, 431 S.) , Ill., graph. Darst.
    ISBN: 9783642007293 , 9783642007309
    Series Statement: Lecture notes in computer science 5461
    Note: Literaturangaben
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Chiffrierung ; Kryptologie ; Kryptoanalyse ; Rechnernetz ; Datensicherung ; Computersicherheit ; Authentifikation ; Digital Rights Management ; Privatsphäre ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    almahu_9947920712202882
    Format: XVI, 548 p. , online resource.
    ISBN: 9783540305392
    Series Statement: Lecture Notes in Computer Science, 3329
    Content: The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5–9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors’ information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers’ names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.
    Note: Block Ciphers -- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds -- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC -- Eliminating Random Permutation Oracles in the Even-Mansour Cipher -- Public Key Encryption -- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles -- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding -- Invited Talk I -- Stream Ciphers: Dead or Alive? -- Number Theory and Algebra -- On the Generalized Linear Equivalence of Functions Over Finite Fields -- Sieving Using Bucket Sort -- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups -- Secure Computation -- Practical Two-Party Computation Based on the Conditional Gate -- Privacy in Non-private Environments -- Asynchronous Proactive Cryptosystems Without Agreement -- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes -- Hash Functions -- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions -- Higher Order Universal One-Way Hash Functions -- The MD2 Hash Function Is Not One-Way -- Key Management -- New Approaches to Password Authenticated Key Exchange Based on RSA -- Constant-Round Authenticated Group Key Exchange for Dynamic Groups -- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates -- Identification -- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices -- Secret Handshakes from CA-Oblivious Encryption -- k-Times Anonymous Authentication (Extended Abstract) -- XL-Algorithms -- The XL-Algorithm and a Conjecture from Commutative Algebra -- Comparison Between XL and Gröbner Basis Algorithms -- Digital Signatures -- Generic Homomorphic Undeniable Signatures -- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice -- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes -- Invited Talk II -- Information Security in Korea IT839 Strategy -- Symmetric Key Cryptanalysis -- How Far Can We Go Beyond Linear Cryptanalysis? -- The Davies-Murphy Power Attack -- Time-Memory Trade-Off Attacks on Multiplications and T-Functions -- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 -- Protocols -- On Provably Secure Time-Stamping Schemes -- Strong Conditional Oblivious Transfer and Computing on Intervals -- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783540239758
    Language: English
    Subjects: Computer Science
    RVK:
    URL: Volltext  (lizenzpflichtig)
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    kobvindex_ZLB15028756
    Format: XIII, 431 Seiten , Ill., graph. Darst. , 24 cm
    ISBN: 9783642007293
    Series Statement: Lecture notes in computer science 5461
    Note: Literaturangaben , Text engl.
    Language: English
    Keywords: Chiffrierung ; Kryptologie ; Kongress ; Seoul 〈2008〉 ; Kryptoanalyse ; Kongress ; Seoul 〈2008〉 ; Rechnernetz ; Datensicherung ; Computersicherheit ; Kongress ; Seoul 〈2008〉 ; Authentifikation ; Kongress ; Seoul 〈2008〉 ; Digital Rights Management ; Privatsphäre ; Kongress ; Seoul 〈2008〉 ; Kongress ; Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9947364287402882
    Format: XIII, 433 p. , online resource.
    ISBN: 9783642007309
    Series Statement: Lecture Notes in Computer Science, 5461
    Content: This book constitutes the refereed proceedings of the 11th International Conference on Information Security and Cryptology, ICISC 2008, held in Seoul, Korea, during December 3-5, 2008. The 26 revised full papers presented have gone through two rounds of reviewing and improvement and were carefully selected from 131 submissions. The papers are organized in topical sections on public key encryption, key management and secret sharing, privacy and digital rights, digital signature and voting, side channel attack, hash and mac, primitives and foundations, as well as block and stream ciphers.
    Note: Public Key Encryption -- Simple CCA-Secure Public Key Encryption from Any Non-Malleable Identity-Based Encryption -- Distributed Attribute-Based Encryption -- Improved Partial Key Exposure Attacks on RSA by Guessing a Few Bits of One of the Prime Factors -- Simple Algorithms for Computing a Sequence of 2-Isogenies -- Key Management and Secret Sharing -- Survival in the Wild: Robust Group Key Agreement in Wide-Area Networks -- Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images -- Privacy and Digital Rights -- The Swiss-Knife RFID Distance Bounding Protocol -- Protecting Location Privacy through a Graph-Based Location Representation and a Robust Obfuscation Technique -- Anonymous Fingerprinting for Predelivery of Contents -- Instruction Set Limitation in Support of Software Diversity -- Digital Signature and Voting -- Non-interactive Identity-Based DNF Signature Scheme and Its Extensions -- How to Balance Privacy with Authenticity -- Efficient Vote Validity Check in Homomorphic Electronic Voting -- Side Channel Attack -- Secure Hardware Implementation of Non-linear Functions in the Presence of Glitches -- Novel PUF-Based Error Detection Methods in Finite State Machines -- Partition vs. Comparison Side-Channel Distinguishers: An Empirical Evaluation of Statistical Tests for Univariate Side-Channel Attacks against Two Unprotected CMOS Devices -- Hash and MAC -- A Single-Key Domain Extender for Privacy-Preserving MACs and PRFs -- Extended Models for Message Authentication -- A Preimage Attack for 52-Step HAS-160 -- Primitives and Foundations -- Essentially Optimal Universally Composable Oblivious Transfer -- Generalized Universal Circuits for Secure Evaluation of Private Functions with Application to Data Classification -- Proving a Shuffle Using Representations of the Symmetric Group -- On Formal Verification of Arithmetic-Based Cryptographic Primitives -- Block and Stream -- A New Technique for Multidimensional Linear Cryptanalysis with Applications on Reduced Round Serpent -- Almost Fully Optimized Infinite Classes of Boolean Functions Resistant to (Fast) Algebraic Cryptanalysis -- Higher Order Differential Attacks on Reduced-Round MISTY1.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9783642007293
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 8
    UID:
    almahu_9948621325802882
    Format: XVI, 548 p. , online resource.
    Edition: 1st ed. 2004.
    ISBN: 9783540305392
    Series Statement: Lecture Notes in Computer Science, 3329
    Content: The 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5-9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors' information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers' names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers.
    Note: Block Ciphers -- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds -- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC -- Eliminating Random Permutation Oracles in the Even-Mansour Cipher -- Public Key Encryption -- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles -- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding -- Invited Talk I -- Stream Ciphers: Dead or Alive? -- Number Theory and Algebra -- On the Generalized Linear Equivalence of Functions Over Finite Fields -- Sieving Using Bucket Sort -- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups -- Secure Computation -- Practical Two-Party Computation Based on the Conditional Gate -- Privacy in Non-private Environments -- Asynchronous Proactive Cryptosystems Without Agreement -- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes -- Hash Functions -- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions -- Higher Order Universal One-Way Hash Functions -- The MD2 Hash Function Is Not One-Way -- Key Management -- New Approaches to Password Authenticated Key Exchange Based on RSA -- Constant-Round Authenticated Group Key Exchange for Dynamic Groups -- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates -- Identification -- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices -- Secret Handshakes from CA-Oblivious Encryption -- k-Times Anonymous Authentication (Extended Abstract) -- XL-Algorithms -- The XL-Algorithm and a Conjecture from Commutative Algebra -- Comparison Between XL and Gröbner Basis Algorithms -- Digital Signatures -- Generic Homomorphic Undeniable Signatures -- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice -- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes -- Invited Talk II -- Information Security in Korea IT839 Strategy -- Symmetric Key Cryptanalysis -- How Far Can We Go Beyond Linear Cryptanalysis? -- The Davies-Murphy Power Attack -- Time-Memory Trade-Off Attacks on Multiplications and T-Functions -- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 -- Protocols -- On Provably Secure Time-Stamping Schemes -- Strong Conditional Oblivious Transfer and Computing on Intervals -- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9783540239758
    Additional Edition: Printed edition: ISBN 9783662167434
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 9
    UID:
    almafu_BV016876992
    Format: XI, 536 S. : Ill., graph. Darst.
    ISBN: 3-540-00716-4
    Series Statement: Lecture notes in computer science 2587
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 10
    UID:
    b3kat_BV016876992
    Format: XI, 536 S. , Ill., graph. Darst.
    ISBN: 3540007164
    Series Statement: Lecture notes in computer science 2587
    Note: Includes bibliographical references and index
    Language: English
    Subjects: Computer Science
    RVK:
    Keywords: Konferenzschrift
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages