skip to content
Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings

Author: Hideki Imai; Ronald L Rivest; Tsutomu Matsumoto
Publisher: Berlin ; New York : Springer-Verlag, ©1993.
Series: Lecture notes in computer science, 739.
Edition/Format:   Print book : Document : Conference publication   Computer File : EnglishView all editions and formats
Summary:

This volume contains the proceedings of ASIACRYPT '91, thefirst international conference on the theory and applicationof cryptology to be held in the Asian area. block ciphers-  Read more...

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

 

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Electronic resources (Books)
Conference papers and proceedings
Congresses
Congrès
Additional Physical Format: Online version:
International Conference on the Theory and Application of Cryptology (1st : 1991 : Fujiyoshida-shi, Japan).
Advances in cryptology, ASIACRYPT '91.
Berlin ; New York : Springer-Verlag, ©1993
(OCoLC)681748596
Material Type: Conference publication, Document, Internet resource
Document Type: Book, Computer File, Internet Resource
All Authors / Contributors: Hideki Imai; Ronald L Rivest; Tsutomu Matsumoto
ISBN: 0387573321 9780387573328 3540573321 9783540573326
OCLC Number: 28891049
Description: x, 498 pages : illustrations ; 24 cm.
Contents: The transition from mechanisms to electronic computers, 1940 to 1950.- Cryptanalysis of LOKI.- Improving resistance to differential cryptanalysis and the redesign of LOKI.- A method to estimate the number of ciphertext pairs for differential cryptanalysis.- Construction of DES-like S-boxes based on Boolean functions satisfying the SAC.- The data base of selected permutations.- A framework for the design of one-way hash functions including cryptanalysis of Damgard's one-way function based on a cellular automaton.- How to construct a family of strong one way permutations.- On claw free families.- Sibling intractable function families and their applications.- A digital multisignature scheme based on the Fiat-Shamir scheme.- A generalized secret sharing scheme with cheater detection.- Generalized threshold cryptosystems.- Feistel type authentication codes.- Research activities on cryptology in korea.- On necessary and sufficient conditions for the construction of super pseudorandom permutations.- A construction of a cipher from a single pseudorandom permutation.- Optimal perfect randomizers.- A general purpose technique for locating key scheduling weaknesses in DES-like cryptosystems.- Results of switching-closure-test on FEAL.- IC-cards and telecommunication services.- Cryptanalysis of several conference key distribution schemes.- Revealing information with partial period correlations (extended abstract).- Extended majority voting and private-key algebraic-code encryptions.- A secure analog speech scrambler using the discrete cosine transform.- An oblivious transfer protocol and its application for the exchange of secrets.- 4 Move perfect ZKIP of knowledge with no assumption.- On the complexity of constant round ZKIP of possession of knowledge.- On the power of two-local random reductions.- A note on one-prover, instance-hiding zero-knowledge proof systems.- An efficient zero-knowledge scheme for the discrete logarithm based on smooth numbers.- An extension of zero-knowledge proofs and its applications.- Any language in IP has a divertible ZKIP.- A multi-purpose proof system - for identity and membership proofs.- Formal verification of probabilistic properties in cryptographic protocols.- Cryptography and machine learning.- Speeding up prime number generation.- Two efficient server-aided secret computation protocols based on the addition sequence.- On ordinary elliptic curve cryptosystems.- Cryptanalysis of another knapsack cryptosystem.- Collisions for Schnorr's hash function FFT-Hash presented at Crypto '91.- On NIST's proposed digital signature standard.- A known-plaintext attack of FEAL-4 based on the system of linear equations on difference.- Simultaneous attacks in differential cryptanalysis (getting more pairs per encryption).- Privacy, cryptographic pseudonyms, and the state of health.- Limitations of the Even-Mansour construction.
Series Title: Lecture notes in computer science, 739.
Responsibility: Hideki Imai, Ronald L. Rivest, Tsutomu Matsumoto (eds.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/28891049> # Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings
    a schema:CreativeWork, schema:Book, schema:MediaObject ;
    library:oclcnum "28891049" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/3856004278#Place/berlin> ; # Berlin
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/systemes_informatiques_mesures_de_surete_congres> ; # Systèmes informatiques--Mesures de sûreté--Congrès
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/computerbeveiliging> ; # Computerbeveiliging
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/geheimschrift> ; # Geheimschrift
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/cryptographie_congres> ; # Cryptographie--Congrès
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/securite_informatique> ; # Sécurité informatique
    schema:about <http://dewey.info/class/005.82/e20/> ;
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/3856004278#Topic/cryptographie> ; # Cryptographie
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/26279006> ; # Tsutomu Matsumoto
    schema:contributor <http://viaf.org/viaf/101783249> ; # Ronald L. Rivest
    schema:contributor <http://viaf.org/viaf/25877316> ; # Hideki Imai
    schema:copyrightYear "1993" ;
    schema:creator <http://experiment.worldcat.org/entity/work/data/3856004278#Meeting/international_conference_on_the_theory_and_application_of_cryptology_1st_1991_fujiyoshida_shi_japan> ; # International Conference on the Theory and Application of Cryptology (1st : 1991 : Fujiyoshida-shi, Japan)
    schema:datePublished "1993" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/3856004278> ;
    schema:genre "Conference papers and proceedings"@en ;
    schema:genre "Electronic resources (Books)"@en ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/3856004278#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/681748596> ;
    schema:name "Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings"@en ;
    schema:productID "28891049" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/28891049#PublicationEvent/berlin_new_york_springer_verlag_1993> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/3856004278#Agent/springer_verlag> ; # Springer-Verlag
    schema:url <http://www.library.tufts.edu/ezproxy/ezproxy.asp?LOCATION=SpLinkLeNoCoSc> ;
    schema:url <http://www.springerlink.com/openurl.asp?genre=issue&issn=0302-9743&volume=739> ;
    schema:workExample <http://worldcat.org/isbn/9780387573328> ;
    schema:workExample <http://worldcat.org/isbn/9783540573326> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/28891049> ;
    .


Related Entities

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Agent/springer_verlag> # Springer-Verlag
    a bgn:Agent ;
    schema:name "Springer-Verlag" ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Meeting/international_conference_on_the_theory_and_application_of_cryptology_1st_1991_fujiyoshida_shi_japan> # International Conference on the Theory and Application of Cryptology (1st : 1991 : Fujiyoshida-shi, Japan)
    a bgn:Meeting, schema:Event ;
    schema:location <http://experiment.worldcat.org/entity/work/data/3856004278#Place/fujiyoshida_shi_japan> ; # Fujiyoshida-shi, Japan)
    schema:name "International Conference on the Theory and Application of Cryptology (1st : 1991 : Fujiyoshida-shi, Japan)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Place/fujiyoshida_shi_japan> # Fujiyoshida-shi, Japan)
    a schema:Place ;
    schema:name "Fujiyoshida-shi, Japan)" ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/28891049> ; # Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Topic/computerbeveiliging> # Computerbeveiliging
    a schema:Intangible ;
    schema:name "Computerbeveiliging"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Topic/cryptographie_congres> # Cryptographie--Congrès
    a schema:Intangible ;
    schema:name "Cryptographie--Congrès"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Topic/securite_informatique> # Sécurité informatique
    a schema:Intangible ;
    schema:name "Sécurité informatique"@fr ;
    .

<http://experiment.worldcat.org/entity/work/data/3856004278#Topic/systemes_informatiques_mesures_de_surete_congres> # Systèmes informatiques--Mesures de sûreté--Congrès
    a schema:Intangible ;
    schema:name "Systèmes informatiques--Mesures de sûreté--Congrès"@en ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography"@en ;
    .

<http://viaf.org/viaf/101783249> # Ronald L. Rivest
    a schema:Person ;
    schema:familyName "Rivest" ;
    schema:givenName "Ronald L." ;
    schema:name "Ronald L. Rivest" ;
    .

<http://viaf.org/viaf/25877316> # Hideki Imai
    a schema:Person ;
    schema:birthDate "1943" ;
    schema:familyName "Imai" ;
    schema:givenName "Hideki" ;
    schema:name "Hideki Imai" ;
    .

<http://viaf.org/viaf/26279006> # Tsutomu Matsumoto
    a schema:Person ;
    schema:familyName "Matsumoto" ;
    schema:givenName "Tsutomu" ;
    schema:name "Tsutomu Matsumoto" ;
    .

<http://worldcat.org/isbn/9780387573328>
    a schema:ProductModel ;
    schema:isbn "0387573321" ;
    schema:isbn "9780387573328" ;
    .

<http://worldcat.org/isbn/9783540573326>
    a schema:ProductModel ;
    schema:isbn "3540573321" ;
    schema:isbn "9783540573326" ;
    .

<http://www.worldcat.org/oclc/681748596>
    a schema:CreativeWork ;
    rdfs:label "Advances in cryptology, ASIACRYPT '91." ;
    schema:description "Online version:" ;
    schema:isSimilarTo <http://www.worldcat.org/oclc/28891049> ; # Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings
    .

<http://www.worldcat.org/title/-/oclc/28891049>
    a genont:InformationResource, genont:ContentTypeGenericResource ;
    schema:about <http://www.worldcat.org/oclc/28891049> ; # Advances in cryptology, ASIACRYPT '91 : International Conference on the Theory and Application of Cryptology, Fujiyoshida, Japan, November 11-14, 1991 : proceedings
    schema:dateModified "2018-01-09" ;
    void:inDataset <http://purl.oclc.org/dataset/WorldCat> ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.