Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
Medientyp
Sprache
Region
Bibliothek
Erscheinungszeitraum
Fachgebiete(RVK)
Schlagwörter
Zugriff
  • 1
    Online-Ressource
    Online-Ressource
    Berlin [u.a.] : Springer
    UID:
    almafu_9959185685202883
    Ausgabe: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 9783540545088
    Serie: Lecture Notes in Computer Science 537
    In: Springer eBooks
    Weitere Ausg.: ISBN 9783540384243
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    Online-Ressource
    Online-Ressource
    Berlin [u.a.] : Springer
    UID:
    edoccha_9959185685202883
    Ausgabe: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 9783540545088
    Serie: Lecture Notes in Computer Science 537
    In: Springer eBooks
    Weitere Ausg.: ISBN 9783540384243
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    Online-Ressource
    Online-Ressource
    Berlin [u.a.] : Springer
    UID:
    edocfu_9959185685202883
    Ausgabe: Online edition Springer Lecture Notes Archive ; 041142-5
    ISBN: 9783540545088
    Serie: Lecture Notes in Computer Science 537
    In: Springer eBooks
    Weitere Ausg.: ISBN 9783540384243
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    gbv_025043080
    Umfang: XIII, 643 S. , graph. Darst.
    ISBN: 3540545085 , 0387545085
    Serie: Lecture notes in computer science 537
    Anmerkung: Conference held Aug. 11-15, 1990, at the University of California, Santa Barbara , Literaturangaben
    Weitere Ausg.: Online-Ausg. Menezes, Alfred J., 1965 - Advances in Cryptology-CRYPT0’ 90 Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 1991 ISBN 9783540384243
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Menezes, Alfred J., 1965 - Advances in Cryptology-CRYPT0’ 90 Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg, 1991 ISBN 9783540384243
    Sprache: Englisch
    Fachgebiete: Informatik , Mathematik
    RVK:
    RVK:
    Schlagwort(e): Kryptologie ; Kryptologie ; Konferenzschrift
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin Heidelberg,
    UID:
    almahu_9947920913302882
    Umfang: XIV, 650 p. , online resource.
    ISBN: 9783540384243
    Serie: Lecture Notes in Computer Science, 537
    Inhalt: Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.
    Anmerkung: Cryptanalysis -- Differential Cryptanalysis of DES-like Cryptosystems -- A Statistical Attack of the FEAL-8 Cryptosystem -- An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications -- Protocols -- Quantum Bit Commitment and Coin Tossing Protocols -- Security with Low Communication Overhead -- Fair Computation of General Functions in Presence of Immoral Majority -- One-Way Group Actions -- Algebra and Number Theory -- Solving Large Sparse Linear Systems Over Finite Fields -- On the Computation of Discrete Logarithms in Class Groups -- Matrix Extensions of the RSA Algorithm -- Constructing Elliptic Curve Cryptosystems in Characteristic 2 -- Signatures and Authentication -- Identification Tokens — or: Solving The Chess Grandmaster Problem -- Arbitrated Unconditionally Secure Authentication Can Be Unconditionally Protected against Arbiter’s Attacks -- Convertible Undeniable Signatures -- Unconditionally-Secure Digital Signatures -- Secret Sharing -- Geometric Shared Secret and/or Shared Control Schemes -- Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes -- Collective Coin Tossing Without Assumptions nor Broadcasting -- Key Distribution -- A Key Distribution “Paradox” -- A Modular Approach to Key Distribution -- Hash Functions -- Structural Properties of One-Way Hash Functions -- The MD4 Message Digest Algorithm -- Zero-Knowledge -- Achieving Zero-Knowledge Robustly -- Hiding Instances in Zero-Knowledge Proof Systems -- Multi-Language Zero Knowledge Interactive Proof Systems -- Publicly Verifiable Non-Interactive Zero-Knowledge Proofs -- Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems -- Interactive Proofs with Provable Security against Honest Verifiers -- Randomness -- On the Universality of the Next Bit Test -- A Universal Statistical Test for Random Bit Generators -- On the Impossibility of Private Key Cryptography with Weakly Random Keys -- Applications -- How to Time-Stamp a Digital Document -- How to Utilize the Randomness of Zero-Knowledge Proofs -- Fast Software Encryption Functions -- CORSAIR: A Smart Card for Public Key Cryptosystems -- Design and Analysis I -- Fast Checkers for Cryptography -- Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S. -- The Redoc II Cryptosystem -- A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion -- Design and Analysis II -- A Comparison of Practical Public-Key Cryptosystems based on Integer Factorization and Discrete Logarithms -- Nonlinear Parity Circuits and their Cryptographic Applications -- Cryptographic Significance of the Carry for Ciphers Based on Integer Addition -- Impromptu Talks -- Computation of Discrete Logarithms in Prime Fields -- Systolic Modular Multiplication -- Finding Four Million Large Random Primes -- The FEAL Cipher Family -- Discrete-Log With Compressible Exponents.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540545088
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg :Springer Berlin Heidelberg :
    UID:
    almahu_9948621331502882
    Umfang: XIV, 650 p. , online resource.
    Ausgabe: 1st ed. 1991.
    ISBN: 9783540384243
    Serie: Lecture Notes in Computer Science, 537
    Inhalt: Crypto '90 marked the tenth anniversary of the Crypto conferences held at the University of California at Santa Barbara. The conference was held from August 11 to August 15, 1990 and was sponsored by the International Association for Cryptologic Research, in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Department of Computer Science of the University of California at Santa Barbara. 227 participants from twenty countries around the world. Crypto '90 attracted Roughly 35% of attendees were from academia, 45% from industry and 20% from government. The program was intended to provide a balance between the purely theoretical and the purely practical aspects of cryptography to meet the needs and diversified interests of these various groups. The overall organization of the conference was superbly handled by the general chairperson Sherry McMahan. All of the outstanding features of Crypto, which we have come to expect over the years, were again present and, in addition to all of this, she did a magnificent job in the preparation of the book of abstracts. This is a crucial part of the program and we owe her a great deal of thanks.
    Anmerkung: Cryptanalysis -- Differential Cryptanalysis of DES-like Cryptosystems -- A Statistical Attack of the FEAL-8 Cryptosystem -- An Improved Linear Syndrome Algorithm in Cryptanalysis With Applications -- Protocols -- Quantum Bit Commitment and Coin Tossing Protocols -- Security with Low Communication Overhead -- Fair Computation of General Functions in Presence of Immoral Majority -- One-Way Group Actions -- Algebra and Number Theory -- Solving Large Sparse Linear Systems Over Finite Fields -- On the Computation of Discrete Logarithms in Class Groups -- Matrix Extensions of the RSA Algorithm -- Constructing Elliptic Curve Cryptosystems in Characteristic 2 -- Signatures and Authentication -- Identification Tokens - or: Solving The Chess Grandmaster Problem -- Arbitrated Unconditionally Secure Authentication Can Be Unconditionally Protected against Arbiter's Attacks -- Convertible Undeniable Signatures -- Unconditionally-Secure Digital Signatures -- Secret Sharing -- Geometric Shared Secret and/or Shared Control Schemes -- Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes -- Collective Coin Tossing Without Assumptions nor Broadcasting -- Key Distribution -- A Key Distribution "Paradox" -- A Modular Approach to Key Distribution -- Hash Functions -- Structural Properties of One-Way Hash Functions -- The MD4 Message Digest Algorithm -- Zero-Knowledge -- Achieving Zero-Knowledge Robustly -- Hiding Instances in Zero-Knowledge Proof Systems -- Multi-Language Zero Knowledge Interactive Proof Systems -- Publicly Verifiable Non-Interactive Zero-Knowledge Proofs -- Cryptographic Applications of the Non-Interactive Metaproof and Many-prover Systems -- Interactive Proofs with Provable Security against Honest Verifiers -- Randomness -- On the Universality of the Next Bit Test -- A Universal Statistical Test for Random Bit Generators -- On the Impossibility of Private Key Cryptography with Weakly Random Keys -- Applications -- How to Time-Stamp a Digital Document -- How to Utilize the Randomness of Zero-Knowledge Proofs -- Fast Software Encryption Functions -- CORSAIR: A Smart Card for Public Key Cryptosystems -- Design and Analysis I -- Fast Checkers for Cryptography -- Complexity Theoretic Issues Concerning Block Ciphers Related to D.E.S. -- The Redoc II Cryptosystem -- A Recursive Construction Method of S-boxes Satisfying Strict Avalanche Criterion -- Design and Analysis II -- A Comparison of Practical Public-Key Cryptosystems based on Integer Factorization and Discrete Logarithms -- Nonlinear Parity Circuits and their Cryptographic Applications -- Cryptographic Significance of the Carry for Ciphers Based on Integer Addition -- Impromptu Talks -- Computation of Discrete Logarithms in Prime Fields -- Systolic Modular Multiplication -- Finding Four Million Large Random Primes -- The FEAL Cipher Family -- Discrete-Log With Compressible Exponents.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662197080
    Weitere Ausg.: Printed edition: ISBN 9783540545088
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 7
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg : Springer-Verlag Berlin Heidelberg
    UID:
    gbv_164928862X
    Umfang: Online-Ressource
    ISBN: 9783540384243
    Serie: Lecture Notes in Computer Science 537
    Inhalt: This volume gives the proceedings of Crypto '90, held at the University of California at Santa Barbara, August 11-15, 1990. The conference attracted 227 participants from twenty countries, with attendees from academia, industry, and government. The program provided a balance between the theoretical and the practical aspects of cryptography to meet the needs and diversified interests of the various groups. The selected papers are organized into sections on cryptanalysis, protocols, algebra and number theory, signatures and authentication, secret sharing, key distribution,hash functions, zero-knowledge, randomness, applications, design and analysis, and impromptu talks
    Anmerkung: Literaturangaben
    Weitere Ausg.: ISBN 9783540545088
    Weitere Ausg.: Buchausg. u.d.T. Advances in cryptology - CRYPTO '90 Berlin : Springer, 1991 ISBN 3540545085
    Weitere Ausg.: ISBN 0387545085
    Sprache: Englisch
    Fachgebiete: Informatik , Mathematik
    RVK:
    RVK:
    Schlagwort(e): Kryptologie ; Kryptologie ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540284246?
Meinten Sie 9783540074243?
Meinten Sie 9783540238423?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz