Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Erscheinungszeitraum
Fachgebiete(RVK)
Schlagwörter
Zugriff
  • 1
    UID:
    gbv_355616653
    Umfang: XIII, 578 S. , graph. Darst. , 24 cm
    ISBN: 3540001719
    Serie: Lecture notes in computer science 2501
    Anmerkung: Literaturangaben
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Zheng, Yuliang, 1962 - Advances in Cryptology — ASIACRYPT 2002 Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 2002 ISBN 9783540361787
    Weitere Ausg.: ISBN 3540001719
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    RVK:
    RVK:
    Schlagwort(e): Kryptologie ; Kryptologie ; Konferenzschrift ; Kongress
    URL: Cover
    Mehr zum Autor: Zheng, Yuliang 1962-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9947920428202882
    Umfang: XIV, 582 p. , online resource.
    ISBN: 9783540361787
    Serie: Lecture Notes in Computer Science, 2501
    Inhalt: This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.
    Anmerkung: Analysis of Bernstein’s Factorization Circuit -- A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order -- Looking beyond XTR -- Bounds for Robust Metering Schemes and Their Relationship with A2-code -- Unconditionally Secure Anonymous Encryption and Group Authentication -- Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model -- On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives -- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order -- Efficient Oblivious Transfer in the Bounded-Storage Model -- In How Many Ways Can You Write Rijndael? -- On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis -- Threshold Cryptosystems Based on Factoring -- Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments -- Asynchronous Secure Communication Tolerating Mixed Adversaries -- Amplified Boomerang Attack against Reduced-Round SHACAL -- Enhancing Differential-Linear Cryptanalysis -- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations -- Analysis of Neural Cryptography -- The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm -- A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2 -- A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme -- On Unconditionally Secure Robust Distributed Key Distribution Centers -- Short Signatures in the Random Oracle Model -- The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes -- Transitive Signatures Based on Factoring and RSA -- 1-out-of-n Signatures from a Variety of Keys -- A Revocation Scheme with Minimal Storage at Receivers -- Optimistic Mixing for Exit-Polls -- Improved Construction of Nonlinear Resilient S-Boxes -- An Upper Bound on the Number of m-Resilient Boolean Functions -- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks -- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization -- ID-Based Blind Signature and Ring Signature from Pairings -- Hierarchical ID-Based Cryptography -- Crypto-integrity -- Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540001713
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9948621436002882
    Umfang: XIV, 582 p. , online resource.
    Ausgabe: 1st ed. 2002.
    ISBN: 9783540361787
    Serie: Lecture Notes in Computer Science, 2501
    Inhalt: This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography.
    Anmerkung: Analysis of Bernstein's Factorization Circuit -- A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order -- Looking beyond XTR -- Bounds for Robust Metering Schemes and Their Relationship with A2-code -- Unconditionally Secure Anonymous Encryption and Group Authentication -- Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model -- On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives -- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order -- Efficient Oblivious Transfer in the Bounded-Storage Model -- In How Many Ways Can You Write Rijndael? -- On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis -- Threshold Cryptosystems Based on Factoring -- Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments -- Asynchronous Secure Communication Tolerating Mixed Adversaries -- Amplified Boomerang Attack against Reduced-Round SHACAL -- Enhancing Differential-Linear Cryptanalysis -- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations -- Analysis of Neural Cryptography -- The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm -- A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2 -- A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme -- On Unconditionally Secure Robust Distributed Key Distribution Centers -- Short Signatures in the Random Oracle Model -- The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes -- Transitive Signatures Based on Factoring and RSA -- 1-out-of-n Signatures from a Variety of Keys -- A Revocation Scheme with Minimal Storage at Receivers -- Optimistic Mixing for Exit-Polls -- Improved Construction of Nonlinear Resilient S-Boxes -- An Upper Bound on the Number of m-Resilient Boolean Functions -- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks -- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization -- ID-Based Blind Signature and Ring Signature from Pairings -- Hierarchical ID-Based Cryptography -- Crypto-integrity -- Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662167960
    Weitere Ausg.: Printed edition: ISBN 9783540001713
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    gbv_1649188005
    Umfang: Online-Ressource
    ISBN: 9783540361787 , 3540001719
    Serie: Lecture Notes in Computer Science 2501
    Inhalt: This book constitutes the refereed proceedings of the 8th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2002, held in Singapore, in December 2002. The 34 revised full papers presented together with two invited contributions were carefully reviewed and selected from 173 submissions on the basis of 875 review reports. The papers are organized in topical sections on public key cryptography, authentication, theory, block ciphers, distributed cryptography, cryptanalysis, public key cryptanalysis, secret sharing, digital signatures, applications, Boolean functions, key management, and ID-based cryptography
    Weitere Ausg.: ISBN 9783540001713
    Weitere Ausg.: Buchausg. u.d.T. Advances in cryptology Berlin : Springer, 2002 ISBN 3540001719
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Kryptologie ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Mehr zum Autor: Zheng, Yuliang 1962-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    b3kat_BV014835547
    Umfang: XIII, 578 S.
    ISBN: 3540001719
    Serie: Lecture notes in computer science 2501
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Konferenzschrift
    Mehr zum Autor: Zheng, Yuliang 1962-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    almafu_BV014835547
    Umfang: XIII, 578 S.
    ISBN: 3-540-00171-9
    Serie: Lecture notes in computer science 2501
    Sprache: Englisch
    Fachgebiete: Informatik
    RVK:
    Schlagwort(e): Kryptologie ; Konferenzschrift
    Mehr zum Autor: Zheng, Yuliang 1962-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540001393?
Meinten Sie 9783540000723?
Meinten Sie 9783540001218?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz