Ihre E-Mail wurde erfolgreich gesendet. Bitte prüfen Sie Ihren Maileingang.

Leider ist ein Fehler beim E-Mail-Versand aufgetreten. Bitte versuchen Sie es erneut.

Vorgang fortführen?

Exportieren
  • 1
    UID:
    almahu_BV035023401
    Umfang: XIV, 594 S. ; , 235 mm x 155 mm.
    ISBN: 3-540-85173-9 , 978-3-540-85173-8
    Serie: Lecture notes in computer science 5157
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Konferenzschrift ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 2
    UID:
    b3kat_BV035046960
    Umfang: 1 Online-Ressource (XIV, 594 S.)
    ISBN: 9783540851738 , 9783540851745
    Serie: Lecture notes in computer science 5157
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Konferenzschrift ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 3
    UID:
    almahu_9947364172602882
    Umfang: XIV, 594 p. , online resource.
    ISBN: 9783540851745
    Serie: Lecture Notes in Computer Science, 5157
    Inhalt: This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008. The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.
    Anmerkung: Random Oracles -- The Random Oracle Model and the Ideal Cipher Model Are Equivalent -- Programmable Hash Functions and Their Applications -- Applications -- One-Time Programs -- Adaptive One-Way Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys -- Improved Bounds on Security Reductions for Discrete Log Based Signatures -- Circular-Secure Encryption from Decision Diffie-Hellman -- Public-Key Locally-Decodable Codes -- Hash Functions I -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash Function -- Preimages for Reduced SHA-0 and SHA-1 -- Cryptanalysis I -- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme -- Bug Attacks -- Multiparty Computation I -- Scalable Multiparty Computation with Nearly Optimal Work and Resilience -- Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations -- Cryptanalysis II -- Cryptanalysis of MinRank -- New State Recovery Attack on RC4 -- Public-Key Crypto II -- Dynamic Threshold Public-Key Encryption -- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles -- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles -- Communication Complexity in Algebraic Two-Party Protocols -- Hash Functions II -- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions -- Compression from Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers -- Distributed Private Data Analysis: Simultaneously Solving How and What -- New Efficient Attacks on Statistical Disclosure Control Mechanisms -- Multiparty Computation II -- Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries -- Collusion-Free Protocols in the Mediated Model -- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs -- Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems -- A Framework for Efficient and Composable Oblivious Transfer -- Founding Cryptography on Oblivious Transfer – Efficiently.
    In: Springer eBooks
    Weitere Ausg.: Printed edition: ISBN 9783540851738
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 4
    UID:
    gbv_1647394392
    Umfang: Online-Ressource (digital)
    ISBN: 9783540851745
    Serie: Lecture Notes in Computer Science 5157
    Inhalt: Random Oracles -- The Random Oracle Model and the Ideal Cipher Model Are Equivalent -- Programmable Hash Functions and Their Applications -- Applications -- One-Time Programs -- Adaptive One-Way Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie–Hellman Secret Keys -- Improved Bounds on Security Reductions for Discrete Log Based Signatures -- Circular-Secure Encryption from Decision Diffie-Hellman -- Public-Key Locally-Decodable Codes -- Hash Functions I -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash Function -- Preimages for Reduced SHA-0 and SHA-1 -- Cryptanalysis I -- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme -- Bug Attacks -- Multiparty Computation I -- Scalable Multiparty Computation with Nearly Optimal Work and Resilience -- Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations -- Cryptanalysis II -- Cryptanalysis of MinRank -- New State Recovery Attack on RC4 -- Public-Key Crypto II -- Dynamic Threshold Public-Key Encryption -- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles -- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles -- Communication Complexity in Algebraic Two-Party Protocols -- Hash Functions II -- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions -- Compression from Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers -- Distributed Private Data Analysis: Simultaneously Solving How and What -- New Efficient Attacks on Statistical Disclosure Control Mechanisms -- Multiparty Computation II -- Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries -- Collusion-Free Protocols in the Mediated Model -- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs -- Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems -- A Framework for Efficient and Composable Oblivious Transfer -- Founding Cryptography on Oblivious Transfer – Efficiently.
    Inhalt: This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008. The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.
    Anmerkung: Includes bibliographical references and index
    Weitere Ausg.: ISBN 9783540851738
    Weitere Ausg.: Buchausg. u.d.T. Advances in cryptology - CRYPTO 2008 Berlin : Springer, 2008 ISBN 3540851739
    Weitere Ausg.: ISBN 9783540851738
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Konferenzschrift
    URL: Volltext  (lizenzpflichtig)
    URL: Volltext  (lizenzpflichtig)
    URL: Cover
    Mehr zum Autor: Pandu Rangan, C. 1955-
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 5
    UID:
    almahu_9949972363002882
    Umfang: XIV, 594 p. , online resource.
    Ausgabe: 1st ed. 2008.
    ISBN: 9783540851745
    Serie: Security and Cryptology, 5157
    Inhalt: This book constitutes the refereed proceedings of the 28th Annual International Cryptology Conference, CRYPTO 2008, held in Santa Barbara, CA, USA in August 2008. The 32 revised full papers presented were carefully reviewed and selected from 184 submissions. Addressing all current foundational, theoretical and research aspects of cryptology, cryptography, and cryptanalysis as well as advanced applications, the papers are organized in topical sections on random oracles, applications, public-key crypto, hash functions, cryptanalysis, multiparty computation, privacy, zero knowledge, and oblivious transfer.
    Anmerkung: Random Oracles -- The Random Oracle Model and the Ideal Cipher Model Are Equivalent -- Programmable Hash Functions and Their Applications -- Applications -- One-Time Programs -- Adaptive One-Way Functions and Applications -- Public-Key Crypto I -- Bits Security of the Elliptic Curve Diffie-Hellman Secret Keys -- Improved Bounds on Security Reductions for Discrete Log Based Signatures -- Circular-Secure Encryption from Decision Diffie-Hellman -- Public-Key Locally-Decodable Codes -- Hash Functions I -- Key-Recovery Attacks on Universal Hash Function Based MAC Algorithms -- Cryptanalysis of the GOST Hash Function -- Preimages for Reduced SHA-0 and SHA-1 -- Cryptanalysis I -- On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme -- Bug Attacks -- Multiparty Computation I -- Scalable Multiparty Computation with Nearly Optimal Work and Resilience -- Cryptographic Complexity of Multi-Party Computation Problems: Classifications and Separations -- Cryptanalysis II -- Cryptanalysis of MinRank -- New State Recovery Attack on RC4 -- Public-Key Crypto II -- Dynamic Threshold Public-Key Encryption -- On Notions of Security for Deterministic Encryption, and Efficient Constructions without Random Oracles -- Deterministic Encryption: Definitional Equivalences and Constructions without Random Oracles -- Communication Complexity in Algebraic Two-Party Protocols -- Hash Functions II -- Beyond Uniformity: Better Security/Efficiency Tradeoffs for Compression Functions -- Compression from Collisions, or Why CRHF Combiners Have a Long Output -- Constructing Cryptographic Hash Functions from Fixed-Key Blockciphers -- Distributed Private Data Analysis: Simultaneously Solving How and What -- New Efficient Attacks on Statistical Disclosure Control Mechanisms -- MultipartyComputation II -- Efficient Secure Linear Algebra in the Presence of Covert or Computationally Unbounded Adversaries -- Collusion-Free Protocols in the Mediated Model -- Efficient Constructions of Composable Commitments and Zero-Knowledge Proofs -- Noninteractive Statistical Zero-Knowledge Proofs for Lattice Problems -- A Framework for Efficient and Composable Oblivious Transfer -- Founding Cryptography on Oblivious Transfer - Efficiently.
    In: Springer Nature eBook
    Weitere Ausg.: Printed edition: ISBN 9783540851738
    Weitere Ausg.: Printed edition: ISBN 9783540852124
    Weitere Ausg.: Printed edition: ISBN 9783540873457
    Sprache: Englisch
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
  • 6
    UID:
    kobvindex_ZLB14874501
    Umfang: XIV, 594 Seiten , graph. Darst. , 24 cm
    ISBN: 9783540851738
    Serie: Lecture notes in computer science 5157
    Anmerkung: Literaturangaben , Text engl.
    Sprache: Englisch
    Schlagwort(e): Kryptologie ; Kongress ; Santa Barbara 〈Calif., 2008〉 ; Kongress ; Konferenzschrift
    Bibliothek Standort Signatur Band/Heft/Jahr Verfügbarkeit
    BibTip Andere fanden auch interessant ...
Meinten Sie 9783540851783?
Meinten Sie 9783540351733?
Meinten Sie 9783540257738?
Schließen ⊗
Diese Webseite nutzt Cookies und das Analyse-Tool Matomo. Weitere Informationen finden Sie auf den KOBV Seiten zum Datenschutz