skip to content
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings

Author: Pil Joong Lee
Publisher: Berlin : Springer, ©2004.
Series: Lecture notes in computer science, 3329.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Database:WorldCat
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference papers and proceedings
Congresses
Congrès
Material Type: Conference publication, Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Pil Joong Lee
ISBN: 3540239758 9783540239758
OCLC Number: 57308536
Description: xvi, 546 pages : illustrations ; 24 cm.
Contents: Block Ciphers.- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds.- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC.- Eliminating Random Permutation Oracles in the Even-Mansour Cipher.- Public Key Encryption.- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles.- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding.- Invited Talk I.- Stream Ciphers: Dead or Alive?.- Number Theory and Algebra.- On the Generalized Linear Equivalence of Functions Over Finite Fields.- Sieving Using Bucket Sort.- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups.- Secure Computation.- Practical Two-Party Computation Based on the Conditional Gate.- Privacy in Non-private Environments.- Asynchronous Proactive Cryptosystems Without Agreement.- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes.- Hash Functions.- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions.- Higher Order Universal One-Way Hash Functions.- The MD2 Hash Function Is Not One-Way.- Key Management.- New Approaches to Password Authenticated Key Exchange Based on RSA.- Constant-Round Authenticated Group Key Exchange for Dynamic Groups.- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates.- Identification.- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices.- Secret Handshakes from CA-Oblivious Encryption.- k-Times Anonymous Authentication (Extended Abstract).- XL-Algorithms.- The XL-Algorithm and a Conjecture from Commutative Algebra.- Comparison Between XL and Grobner Basis Algorithms.- Digital Signatures.- Generic Homomorphic Undeniable Signatures.- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings.- Public Key Cryptanalysis.- On the Security of MOR Public Key Cryptosystem.- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice.- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes.- Invited Talk II.- Information Security in Korea IT839 Strategy.- Symmetric Key Cryptanalysis.- How Far Can We Go Beyond Linear Cryptanalysis?.- The Davies-Murphy Power Attack.- Time-Memory Trade-Off Attacks on Multiplications and T-Functions.- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0.- Protocols.- On Provably Secure Time-Stamping Schemes.- Strong Conditional Oblivious Transfer and Computing on Intervals.- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge.
Series Title: Lecture notes in computer science, 3329.
Other Titles: ASIACRYPT 2004
Responsibility: Pil Joong Lee (ed.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/57308536> # Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
    a schema:CreativeWork, schema:Book ;
   library:oclcnum "57308536" ;
   library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
   library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/17279362#Place/berlin> ; # Berlin
   schema:about <http://experiment.worldcat.org/entity/work/data/17279362#Topic/cryptographie_informatique> ; # Cryptographie (Informatique)
   schema:about <http://dewey.info/class/005.82/e22/> ;
   schema:about <http://experiment.worldcat.org/entity/work/data/17279362#Topic/computer_security> ; # Computer security
   schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
   schema:about <http://experiment.worldcat.org/entity/work/data/17279362#Topic/securite_informatique> ; # Sécurité informatique
   schema:about <http://experiment.worldcat.org/entity/work/data/17279362#Topic/cryptography> ; # Cryptography
   schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
   schema:about <http://experiment.worldcat.org/entity/work/data/17279362#Topic/cryptographie> ; # Cryptographie
   schema:alternateName "ASIACRYPT 2004" ;
   schema:bookFormat bgn:PrintBook ;
   schema:contributor <http://experiment.worldcat.org/entity/work/data/17279362#Person/lee_pil_joong> ; # Pil Joong Lee
   schema:copyrightYear "2004" ;
   schema:creator <http://experiment.worldcat.org/entity/work/data/17279362#Meeting/international_conference_on_the_theory_and_application_of_cryptology_and_information_security_10th_2004_jeju_island_korea> ; # International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea)
   schema:datePublished "2004" ;
   schema:exampleOfWork <http://worldcat.org/entity/work/id/17279362> ;
   schema:genre "Conference publication"@en ;
   schema:genre "Conference papers and proceedings"@en ;
   schema:inLanguage "en" ;
   schema:isPartOf <http://worldcat.org/issn/0302-9743> ; # Lecture notes in computer science ;
   schema:name "Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings"@en ;
   schema:productID "57308536" ;
   schema:publication <http://www.worldcat.org/title/-/oclc/57308536#PublicationEvent/berlin_springer_2004> ;
   schema:publisher <http://experiment.worldcat.org/entity/work/data/17279362#Agent/springer> ; # Springer
   schema:url <http://link.springer-ny.com/link/service/jseries/0558/tocs/t3329.htm> ;
   schema:url <http://springerlink.metapress.com/openurl.asp?genre=issue&issn=0302-9743&volume=3329> ;
   schema:url <http://dx.doi.org/10.1007/b104116> ;
   schema:workExample <http://worldcat.org/isbn/9783540239758> ;
   wdrs:describedby <http://www.worldcat.org/title/-/oclc/57308536> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/17279362#Meeting/international_conference_on_the_theory_and_application_of_cryptology_and_information_security_10th_2004_jeju_island_korea> # International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea)
    a bgn:Meeting, schema:Event ;
   schema:location <http://experiment.worldcat.org/entity/work/data/17279362#Place/jeju_island_korea> ; # Jeju Island, Korea)
   schema:name "International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea)" ;
    .

<http://experiment.worldcat.org/entity/work/data/17279362#Person/lee_pil_joong> # Pil Joong Lee
    a schema:Person ;
   schema:familyName "Lee" ;
   schema:givenName "Pil Joong" ;
   schema:name "Pil Joong Lee" ;
    .

<http://experiment.worldcat.org/entity/work/data/17279362#Place/jeju_island_korea> # Jeju Island, Korea)
    a schema:Place ;
   schema:name "Jeju Island, Korea)" ;
    .

<http://experiment.worldcat.org/entity/work/data/17279362#Topic/cryptographie_informatique> # Cryptographie (Informatique)
    a schema:Intangible ;
   schema:name "Cryptographie (Informatique)"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/17279362#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
   schema:name "Sécurité informatique"@en ;
   schema:name "Sécurité informatique"@fr ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
   schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
   schema:name "Cryptography"@en ;
    .

<http://worldcat.org/isbn/9783540239758>
    a schema:ProductModel ;
   schema:isbn "3540239758" ;
   schema:isbn "9783540239758" ;
    .

<http://worldcat.org/issn/0302-9743> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
   schema:hasPart <http://www.worldcat.org/oclc/57308536> ; # Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
   schema:issn "0302-9743" ;
   schema:name "Lecture notes in computer science ;" ;
   schema:name "Lecture notes in computer science," ;
    .

<http://www.worldcat.org/title/-/oclc/57308536>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
   schema:about <http://www.worldcat.org/oclc/57308536> ; # Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
   schema:dateModified "2016-05-11" ;
   void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.