Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
Filter
  • 1
    UID:
    gbv_363084347
    Umfang: XIV, 648 S. , graph. Darst. , 24 cm
    ISBN: 3540140395
    Serie: Lecture notes in computer science 2656
    Anmerkung: Conference sponsored by the IACR, the International Association for Cryptologic Research. - Literaturangaben
    Weitere Ausg.: Erscheint auch als Online-Ausgabe Biham, Eli Advances in Cryptology — EUROCRYPT 2003 Berlin, Heidelberg : International Association for Cryptologic Research, 2003 ISBN 9783540392002
    Weitere Ausg.: ISBN 3540140395
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Kryptologie ; Konferenzschrift
    URL: Cover
    Mehr zum Autor: Biham, Ēlî
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    almahu_9947920713102882
    Umfang: XIV, 654 p. , online resource.
    ISBN: 9783540392002
    Serie: Lecture Notes in Computer Science, 2656
    Anmerkung: Cryptanalysis I -- Cryptanalysis of the EMD Mode of Operation -- On the Optimality of Linear, Differential, and Sequential Distinguishers -- A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms -- Secure Multi-party Computation I -- Two-Threshold Broadcast and Detectable Multi-party Computation -- On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions -- Fair Secure Two-Party Computation -- Invited Talk I -- Facts and Myths of Enigma: Breaking Stereotypes -- Zero-Knowledge Protocols -- Resettable Zero-Knowledge in the Weak Public-Key Model -- Simulatable Commitments and Efficient Concurrent Zero-Knowledge -- Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition -- Strengthening Zero-Knowledge Protocols Using Signatures -- Foundations and Complexity Theoretic Security -- Nearly One-Sided Tests and the Goldreich-Levin Predicate -- Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications -- Public Key Encryption -- A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem -- A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions -- A Forward-Secure Public-Key Encryption Scheme -- Certificate-Based Encryption and the Certificate Revocation Problem -- New Primitives -- CAPTCHA: Using Hard AI Problems for Security -- Concealment and Its Applications to Authenticated Encryption -- Cryptanalysis II -- Predicting the Shrinking Generator with Fixed Connections -- Algebraic Attacks on Stream Ciphers with Linear Feedback -- Elliptic Curves Cryptography -- Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time -- The GHS Attack Revisited -- Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms -- Digital Signatures -- A Signature Scheme as Secure as the Diffie-Hellman Problem -- Aggregate and Verifiably Encrypted Signatures from Bilinear Maps -- Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures -- Invited Talk II -- Why Provable Security Matters? -- Cryptanalysis III -- On the Security of RDSA -- Cryptanalysis of the Public-Key Encryption Based on Braid Groups -- A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications -- Key Exchange -- Provably Secure Threshold Password-Authenticated Key Exchange -- A Framework for Password-Based Authenticated Key Exchange -- Information Theoretic Cryptography -- The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations -- New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction -- Secure Multi-party Computation II -- Round Efficiency of Multi-party Computation with a Dishonest Majority -- Efficient Multi-party Computation over Rings -- Group Signatures -- Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions -- Extracting Group Signatures from Traitor Tracing Schemes.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540140399
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9948621335302882
    Umfang: XIV, 654 p. , online resource.
    Ausgabe: 1st ed. 2003.
    ISBN: 9783540392002
    Serie: Lecture Notes in Computer Science, 2656
    Anmerkung: Cryptanalysis I -- Cryptanalysis of the EMD Mode of Operation -- On the Optimality of Linear, Differential, and Sequential Distinguishers -- A Toolbox for Cryptanalysis: Linear and Affine Equivalence Algorithms -- Secure Multi-party Computation I -- Two-Threshold Broadcast and Detectable Multi-party Computation -- On the Limitations of Universally Composable Two-Party Computation without Set-up Assumptions -- Fair Secure Two-Party Computation -- Invited Talk I -- Facts and Myths of Enigma: Breaking Stereotypes -- Zero-Knowledge Protocols -- Resettable Zero-Knowledge in the Weak Public-Key Model -- Simulatable Commitments and Efficient Concurrent Zero-Knowledge -- Simulation in Quasi-Polynomial Time, and Its Application to Protocol Composition -- Strengthening Zero-Knowledge Protocols Using Signatures -- Foundations and Complexity Theoretic Security -- Nearly One-Sided Tests and the Goldreich-Levin Predicate -- Efficient and Non-malleable Proofs of Plaintext Knowledge and Applications -- Public Key Encryption -- A Public Key Encryption Scheme Based on the Polynomial Reconstruction Problem -- A Simpler Construction of CCA2-Secure Public-Key Encryption under General Assumptions -- A Forward-Secure Public-Key Encryption Scheme -- Certificate-Based Encryption and the Certificate Revocation Problem -- New Primitives -- CAPTCHA: Using Hard AI Problems for Security -- Concealment and Its Applications to Authenticated Encryption -- Cryptanalysis II -- Predicting the Shrinking Generator with Fixed Connections -- Algebraic Attacks on Stream Ciphers with Linear Feedback -- Elliptic Curves Cryptography -- Counting Points on Elliptic Curves over Finite Fields of Small Characteristic in Quasi Quadratic Time -- The GHS Attack Revisited -- Improved Algorithms for Efficient Arithmetic on Elliptic Curves Using Fast Endomorphisms -- Digital Signatures -- A Signature Scheme as Secure as the Diffie-Hellman Problem -- Aggregate and Verifiably Encrypted Signatures from Bilinear Maps -- Hypercubic Lattice Reduction and Analysis of GGH and NTRU Signatures -- Invited Talk II -- Why Provable Security Matters? -- Cryptanalysis III -- On the Security of RDSA -- Cryptanalysis of the Public-Key Encryption Based on Braid Groups -- A Theoretical Treatment of Related-Key Attacks: RKA-PRPs, RKA-PRFs, and Applications -- Key Exchange -- Provably Secure Threshold Password-Authenticated Key Exchange -- A Framework for Password-Based Authenticated Key Exchange -- Information Theoretic Cryptography -- The Security of Many-Round Luby-Rackoff Pseudo-Random Permutations -- New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction -- Secure Multi-party Computation II -- Round Efficiency of Multi-party Computation with a Dishonest Majority -- Efficient Multi-party Computation over Rings -- Group Signatures -- Foundations of Group Signatures: Formal Definitions, Simplified Requirements, and a Construction Based on General Assumptions -- Extracting Group Signatures from Traitor Tracing Schemes.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783662189450
    Weitere Ausg.: Printed edition: ISBN 9783540140399
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    Online-Ressource
    Online-Ressource
    Berlin, Heidelberg : International Association for Cryptologic Research
    UID:
    gbv_1649202539
    Umfang: Online-Ressource
    ISBN: 9783540392002 , 3540140395
    Serie: Lecture Notes in Computer Science 2656
    Inhalt: This book constitutes the refereed proceedings of the International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2003, held in Warsaw, Poland in May 2003. The 37 revised full papers presented together with two invited papers were carefully reviewed and selected from 156 submissions. The papers are organized in topical sections on cryptanalysis, secure multi-party communication, zero-knowledge protocols, foundations and complexity-theoretic security, public key encryption, new primitives, elliptic curve cryptography, digital signatures, information-theoretic cryptography, and group signatures
    Anmerkung: Conference sponsored by the IACR, the International Association for Cryptologic Research. - Literaturangaben
    Weitere Ausg.: ISBN 9783540140399
    Weitere Ausg.: Buchausg. u.d.T. Advances in cryptology Berlin : Springer, 2003 ISBN 3540140395
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Kryptologie ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540292005?
Meinten Sie 9783540292302?
Meinten Sie 9783540190202?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz