Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    New York : Springer
    UID:
    almafu_9959185685402883
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 9780387971964
    Series Statement: Lecture Notes in Computer Science 403
    In: Springer eBooks
    Additional Edition: ISBN 9780387347998
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    New York, NY : Springer-Verlag Berlin Heidelberg
    UID:
    gbv_1649186177
    Format: Online-Ressource
    ISBN: 9780387347998 , 3540971963 , 0387971963
    Series Statement: Lecture Notes in Computer Science 403
    Content: The papers in this volume were presented at the CRYPTO '88 conference on theory and applications of cryptography, held in Santa Barbara, California, August 21-25, 1988. The papers were chosen for their perceived originality and often represent preliminary reports on continuing reserach. The main sections deal with the following topics: Zero-Knowledge, Number Theory, Pseudorandomness, Signatures, Complexity, Protocols, Security, Cryptoanalysis. As such, they will give the committed reader a unique insight into the very latest developments in the field
    Note: Literaturangaben
    Additional Edition: ISBN 9780387971964
    Additional Edition: Buchausg. u.d.T. Advances in cryptology - CRYPTO '88 Berlin : Springer, 1990 ISBN 3540971963
    Additional Edition: ISBN 0387971963
    Language: English
    Keywords: Kryptologie ; Kryptologie ; Kryptologie ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    New York : Springer
    UID:
    edoccha_9959185685402883
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 9780387971964
    Series Statement: Lecture Notes in Computer Science 403
    In: Springer eBooks
    Additional Edition: ISBN 9780387347998
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    New York : Springer
    UID:
    edocfu_9959185685402883
    Edition: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 9780387971964
    Series Statement: Lecture Notes in Computer Science 403
    In: Springer eBooks
    Additional Edition: ISBN 9780387347998
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 5
    UID:
    gbv_022603212
    Format: XI, 591 S. , graph. Darst.
    ISBN: 3540971963 , 0387971963
    Series Statement: Lecture notes in computer science 403
    Note: Literaturangaben
    Additional Edition: Online-Ausg. Goldwasser, Shafi, 1958 - Advances in Cryptology — CRYPTO’ 88 New York, NY : Springer-Verlag Berlin Heidelberg, 1990 ISBN 9780387347998
    Additional Edition: ISBN 3540971963
    Additional Edition: ISBN 0387971963
    Additional Edition: Erscheint auch als Online-Ausgabe Goldwasser, Shafi, 1958 - Advances in Cryptology — CRYPTO’ 88 New York, NY : Springer-Verlag Berlin Heidelberg, 1990 ISBN 9780387347998
    Additional Edition: ISBN 3540971963
    Additional Edition: ISBN 0387971963
    Language: English
    Keywords: Kryptologie ; Konferenzschrift ; Konferenzschrift
    URL: Cover
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 6
    UID:
    almahu_9947921012102882
    Format: XIV, 598 p. , online resource.
    ISBN: 9780387347998
    Series Statement: Lecture Notes in Computer Science, 403
    Note: Cryptographic Primitives -- Weakening Security Assumptions and Oblivious Transfer -- Limits on the Provable Consequences of One-way Permutations -- Generalized Secret Sharing and Monotone Functions -- Zero-Knowledge -- Everything Provable is Provable in Zero-Knowledge -- A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm -- Zero-Knowledge With Finite State Verifiers -- Number Theory -- Intractable Problems in Number Theory -- A Family of Jacobians Suitable for Discrete Log Cryptosystems -- Computation of Approximate L-th Roots Modulo n and Application to Cryptography -- Cryptanalysis -- On the McEliece Public-Key Cryptosystem -- A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers -- Pseudorandomness -- On the Existence of Pseudorandom Generators -- On The Randomness of Legendre and Jacobi Sequences -- Efficient, Perfect Random Number Generators -- Signatures and Authentication -- How To Sign Given Any Trapdoor Function -- A “Paradoxical” Indentity-Based Signature Scheme Resulting from Zero-Knowledge -- A Modification of the Fiat-Shamir Scheme -- An Improvement of the Fiat-Shamir Identification and Signature Scheme -- On the Theory of Security I -- A Basic Theory of Public and Private Cryptosystems -- Proving Security Against Chosen Ciphertext Attacks -- Non-Interactive Zero-Knowledge with Preprocessing -- On the Theory of Security II -- The Noisy Oracle Problem -- On Generating Solved Instances of Computational Problems -- Bounds and Constructions for Authentication - Secrecy Codes with Splitting -- Protocols -- Untraceable Electronic Cash -- Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals -- A Universal Problem in Secure and Verifiable Distributed Computation -- Security Concerns -- An Abstract Theory of Computer Viruses -- Abuses in Cryptography and How to Fight Them -- How to (Really) Share a Secret -- Linear Complexity -- The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition -- On the Linear Syndrome Method in Cryptanalysis -- Aperiodic Linear Complexities of de Bruijn Sequences -- Systems -- The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities -- Speeding Up Secret Computations with Insecure Auxiliary Devices -- Developing Ethernet Enhanced-Security System -- A Secure Audio Teleconference System -- Short Rump Session Presentations -- Diffie-Hellman is as Strong as Discrete Log for Certain Primes -- Secret Error-Correcting Codes (SECC) -- The Detection of Cheaters in Threshold Schemes -- On the Power of 1-way Functions -- “Practical IP” ? MA -- Zero-Knowledge Authentication Scheme with Secret Key Exchange.
    In: Springer eBooks
    Additional Edition: Printed edition: ISBN 9780387971964
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 7
    UID:
    almahu_9948621229202882
    Format: XIV, 598 p. , online resource.
    Edition: 1st ed. 1990.
    ISBN: 9780387347998
    Series Statement: Lecture Notes in Computer Science, 403
    Note: Cryptographic Primitives -- Weakening Security Assumptions and Oblivious Transfer -- Limits on the Provable Consequences of One-way Permutations -- Generalized Secret Sharing and Monotone Functions -- Zero-Knowledge -- Everything Provable is Provable in Zero-Knowledge -- A Perfect Zero-Knowledge Proof for a Problem Equivalent to Discrete Logarithm -- Zero-Knowledge With Finite State Verifiers -- Number Theory -- Intractable Problems in Number Theory -- A Family of Jacobians Suitable for Discrete Log Cryptosystems -- Computation of Approximate L-th Roots Modulo n and Application to Cryptography -- Cryptanalysis -- On the McEliece Public-Key Cryptosystem -- A Constraint Satisfaction Algorithm for the Automated Decryption of Simple Substitution Ciphers -- Pseudorandomness -- On the Existence of Pseudorandom Generators -- On The Randomness of Legendre and Jacobi Sequences -- Efficient, Perfect Random Number Generators -- Signatures and Authentication -- How To Sign Given Any Trapdoor Function -- A "Paradoxical" Indentity-Based Signature Scheme Resulting from Zero-Knowledge -- A Modification of the Fiat-Shamir Scheme -- An Improvement of the Fiat-Shamir Identification and Signature Scheme -- On the Theory of Security I -- A Basic Theory of Public and Private Cryptosystems -- Proving Security Against Chosen Ciphertext Attacks -- Non-Interactive Zero-Knowledge with Preprocessing -- On the Theory of Security II -- The Noisy Oracle Problem -- On Generating Solved Instances of Computational Problems -- Bounds and Constructions for Authentication - Secrecy Codes with Splitting -- Protocols -- Untraceable Electronic Cash -- Payment Systems and Credential Mechanisms with Provable Security Against Abuse by Individuals -- A Universal Problem in Secure and Verifiable Distributed Computation -- Security Concerns -- An Abstract Theory of Computer Viruses -- Abuses in Cryptography and How to Fight Them -- How to (Really) Share a Secret -- Linear Complexity -- The Strict Avalanche Criterion: Spectral Properties of Boolean Functions and an Extended Definition -- On the Linear Syndrome Method in Cryptanalysis -- Aperiodic Linear Complexities of de Bruijn Sequences -- Systems -- The Application of Smart Cards for Rsa Digital Signatures in a Network Comprising Both Interactive and Store-and-Forward Facilities -- Speeding Up Secret Computations with Insecure Auxiliary Devices -- Developing Ethernet Enhanced-Security System -- A Secure Audio Teleconference System -- Short Rump Session Presentations -- Diffie-Hellman is as Strong as Discrete Log for Certain Primes -- Secret Error-Correcting Codes (SECC) -- The Detection of Cheaters in Threshold Schemes -- On the Power of 1-way Functions -- "Practical IP" ? MA -- Zero-Knowledge Authentication Scheme with Secret Key Exchange.
    In: Springer Nature eBook
    Additional Edition: Printed edition: ISBN 9781475789171
    Additional Edition: Printed edition: ISBN 9780387971964
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 9780367349998?
Did you mean 9780387347158?
Did you mean 9780387341798?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages