skip to content
Advances in cryptology - ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 ; proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology - ASIACRYPT 2007 : 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 ; proceedings

Author: Kaoru Kurosawa; International Association for Cryptologic Research.
Publisher: Berlin : Springer, 2007.
Series: Lecture notes in computer science, 4833.; LNCS sublibrary., SL 4, Security and cryptology.
Edition/Format:   Book : Document : Conference publication   Computer File : EnglishView all editions and formats
Database:WorldCat
Summary:

Constitutes the refereed proceedings of the 13th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2007, held in Kuching, Malaysia, in December  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Conference proceedings
Congresses
Material Type: Conference publication, Document
Document Type: Book, Computer File
All Authors / Contributors: Kaoru Kurosawa; International Association for Cryptologic Research.
ISBN: 9783540768999 3540768998
OCLC Number: 403660429
Notes: In: MyiLibrary.
Visionné le 1er mai 2009.
Reproduction Notes: Reproduction en format électronique.. Berlin : Springer, 2007. Reproduction en format électronique.. UK : MyiLibrary, 2008.
Description: xiv, 581 p. : ill. ; 24 cm.
Contents: Number Theory and Elliptic Curve.- A Kilobit Special Number Field Sieve Factorization.- When e-th Roots Become Easier Than Factoring.- Faster Addition and Doubling on Elliptic Curves.- Protocol.- A Non-interactive Shuffle with Pairing Based Verifiability.- On Privacy Models for RFID.- Invited Talk I.- Obtaining Universally Compoable Security: Towards the Bare Bones of Trust.- A Simple Variant of the Merkle-Damgard Scheme with a Permutation.- Seven-Property-Preserving Iterated Hashing: ROX.- How to Build a Hash Function from Any Collision-Resistant Function.- Fully Anonymous Group Signatures Without Random Oracles.- Group Encryption.- Identity-Based Broadcast Encryption with Constant Size Ciphertexts and Private Keys.- Boosting Merkle-Damgard Hashing for Message Authentication.- On Efficient Message Authentication Via Block Cipher Design Techniques.- Symmetric Key Cryptography on Modern Graphics Hardware.- Multiparty Computation I.- Blind Identity-Based Encryption and Simulatable Oblivious Transfer.- Multi-party Indirect Indexing and Applications.- Two-Party Computing with Encrypted Data.- Known-Key Distinguishers for Some Block Ciphers.- Generic Attacks on Unbalanced Feistel Schemes with Expanding Functions.- On Tweaking Luby-Rackoff Blockciphers.- Multiparty Computation II.- Secure Protocols with Asymmetric Trust.- Simple and Efficient Perfectly-Secure Asynchronous MPC.- Efficient Byzantine Agreement with Faulty Minority.- Information-Theoretic Security Without an Honest Majority.- Black-Box Extension Fields and the Inexistence of Field-Homomorphic One-Way Permutations.- Concurrent Statistical Zero-Knowledge Arguments for NP from One Way Functions.- Anonymous Quantum Communication.- Invited Talk II.- Authenticated Key Exchange and Key Encapsulation in the Standard Model.- Miniature CCA2 PK Encryption: Tight Security Without Redundancy.- Bounded CCA2-Secure Encryption.- Relations Among Notions of Non-malleability for Encryption.- Cryptanalysis of the Tiger Hash Function.- Cryptanalysis of Grindahl.- A Key Recovery Attack on Edon80.
Series Title: Lecture notes in computer science, 4833.; LNCS sublibrary., SL 4, Security and cryptology.
Other Titles: SpringerLINK (Online publications)
13th International Conference on the Theory and Application of Cryptology and Information Security
Thirteenth International Conference on the Theory and Application of Cryptology and Information Security
International Conference on the Theory and Application of Cryptology and Information Security
ASIACRYPT 2007
MyiLibrary
Responsibility: Kaoru Kurosawa (ed.).
More information:

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


<http://www.worldcat.org/oclc/403660429>
library:oclcnum"403660429"
library:placeOfPublication
library:placeOfPublication
owl:sameAs<info:oclcnum/403660429>
rdf:typeschema:Book
rdfs:seeAlso
rdfs:seeAlso
schema:about
schema:about
schema:about
schema:about
schema:about
schema:about
schema:contributor
schema:contributor
<http://viaf.org/viaf/141764476>
rdf:typeschema:Organization
schema:name"International Association for Cryptologic Research."
schema:creator
schema:datePublished"2007"
schema:exampleOfWork<http://worldcat.org/entity/work/id/900806424>
schema:genre"Conference proceedings"
schema:genre"Conference proceedings."
schema:inLanguage"en"
schema:name"ASIACRYPT 2007"
schema:name"Advances in cryptology - ASIACRYPT 2007 13th International Conference on the Theory and Application of Cryptology and Information Security, Kuching, Malaysia, December 2-6, 2007 ; proceedings"
schema:name"13th International Conference on the Theory and Application of Cryptology and Information Security"
schema:name"Thirteenth International Conference on the Theory and Application of Cryptology and Information Security"
schema:name"International Conference on the Theory and Application of Cryptology and Information Security"
schema:numberOfPages"581"
schema:publisher
schema:url
schema:workExample

Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.