skip to content
Advances in cryptology : proceedings Preview this item
ClosePreview this item
Checking...

Advances in cryptology : proceedings

Author: Colin Boyd; ASIACRYPT
Publisher: Berlin ; Heidelberg ; New York ; Barcelona ; Hong Kong ; London ; Milan ; Paris ; Tokyo : Springer, 2001.
Series: Lecture notes in computer science, vol. 2248.
Edition/Format:   Print book : Conference publication : EnglishView all editions and formats
Publication:Advances in Cryptology -- ASIACRYPT 2001
Summary:

The origins of the Asiacrypt series of conferences can be traced back to 1990, when the ?rst Auscrypt conference was held, although the name Asiacrypt was ?rst used for the 1991 conference in Japan.

Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Genre/Form: Kongress
Conference papers and proceedings
Congresses
Material Type: Conference publication, Internet resource
Document Type: Book, Internet Resource
All Authors / Contributors: Colin Boyd; ASIACRYPT
ISBN: 3540429875 9783540429876
OCLC Number: 76311834
In: Boyd, Colin
Notes: Literaturangaben.
Description: XI, 601 Seiten : Diagramme ; 24 cm.
Contents: Lattice Based Cryptography.- Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001.- On the Insecurity of a Server-Aided RSA Protocol.- The Modular Inversion Hidden Number Problem.- Human Identification.- Secure Human Identification Protocols.- Invited Talk.- Unbelievable Security Matching AES Security Using Public Key Systems.- Practical Public Key Cryptography.- A Probable Prime Test with Very High Confidence for n ? 1 mod 4.- Computation of Discrete Logarithms in .- Speeding Up XTR.- An Efficient Implementation of Braid Groups.- Cryptography Based on Coding Theory.- How to Achieve a McEliece-Based Digital Signature Scheme.- Efficient Traitor Tracing Algorithms Using List Decoding.- Block Ciphers.- Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis.- Known-IV Attacks on Triple Modes of Operation of Block Ciphers.- Generic Attacks on Feistel Schemes.- A Compact Rijndael Hardware Architecture with S-Box Optimization.- Provable Security.- Provable Security of KASUMI and 3GPP Encryption Mode f8.- Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices.- Provably Authenticated Group Diffie-Hellman Key Exchange - The Dynamic Case.- Threshold Cryptography.- Fully Distributed Threshold RSA under Standard Assumptions.- Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes.- Threshold Cryptosystems Secure against Chosen-Ciphertext Attacks.- Two-Party Protocols.- Oblivious Polynomial Evaluation and Oblivious Neural Learning.- Mutually Independent Commitments.- Zero Knowledge.- Efficient Zero-Knowledge Authentication Based on a Linear Algebra Problem MinRank.- Responsive Round Complexity and Concurrent Zero-Knowledge.- Cryptographic Building Blocks.- Practical Construction and Analysis of Pseudo-Randomness Primitives.- Autocorrelation Coefficients and Correlation Immunity of Boolean Functions.- Elliptic Curve Cryptography.- An Extension of Kedlaya's Point-Counting Algorithm to Superelliptic Curves.- Supersingular Curves in Cryptography.- Short Signatures from the Weil Pairing.- Self-Blindable Credential Certificates from the Weil Pairing.- Anonymity.- How to Leak a Secret.- Key-Privacy in Public-Key Encryption.- Provably Secure air Blind Signatures with Tight Revocation.
Series Title: Lecture notes in computer science, vol. 2248.
Responsibility: ASIACRYPT 2001, 7th International Conference on the Theory and Application of Cryptology and Information Security, Gold Coast, Australia, December 9-13, 2001. Colin Boyd (ed.).

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/76311834> # Advances in cryptology : proceedings
    a schema:CreativeWork, schema:Book ;
    library:oclcnum "76311834" ;
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/807498784#Place/paris> ; # Paris
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/807498784#Place/heidelberg> ; # Heidelberg
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/807498784#Place/milan> ; # Milan
    library:placeOfPublication <http://id.loc.gov/vocabulary/countries/gw> ;
    library:placeOfPublication <http://dbpedia.org/resource/London> ; # London
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/807498784#Place/tokyo> ; # Tokyo
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/807498784#Place/hong_kong> ; # Hong Kong
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/807498784#Place/berlin> ; # Berlin
    library:placeOfPublication <http://dbpedia.org/resource/New_York_City> ; # New York
    library:placeOfPublication <http://experiment.worldcat.org/entity/work/data/807498784#Place/barcelona> ; # Barcelona
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/protocole_cryptographique> ; # protocole cryptographique
    schema:about <http://dewey.info/class/005.8/> ;
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Place/gold_coast_queensland_2001> ; # Gold Coast .
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/authentification> ; # authentification
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/cryptography> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/theorie_codage> ; # théorie codage
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/systemes_informatiques_mesures_de_surete_congres> ; # Systèmes informatiques--Mesures de sûreté--Congrès
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/securite_donnee> ; # sécurité donnée
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/securite_systeme> ; # sécurité système
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/cryptanalyse> ; # cryptanalyse
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/identification_personne> ; # identification personne
    schema:about <http://id.worldcat.org/fast/872484> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/cryptographie_congres> ; # Cryptographie--Congrès
    schema:about <http://id.worldcat.org/fast/884552> ; # Cryptography
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/kryptologie> ; # Kryptologie
    schema:about <http://experiment.worldcat.org/entity/work/data/807498784#Topic/cryptographie> ; # cryptographie
    schema:bookFormat bgn:PrintBook ;
    schema:contributor <http://viaf.org/viaf/136974810> ; # ASIACRYPT
    schema:contributor <http://viaf.org/viaf/70646647> ; # Colin Boyd
    schema:datePublished "2001" ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/807498784> ;
    schema:genre "Conference papers and proceedings" ;
    schema:genre "Kongress" ;
    schema:genre "Conference publication"@en ;
    schema:inLanguage "en" ;
    schema:isPartOf <http://experiment.worldcat.org/entity/work/data/807498784#Series/lecture_notes_in_computer_science> ; # Lecture notes in computer science ;
    schema:name "Advances in cryptology : proceedings" ;
    schema:productID "76311834" ;
    schema:publication <http://www.worldcat.org/title/-/oclc/76311834#PublicationEvent/berlin_heidelberg_new_york_barcelona_hong_kong_london_milan_paris_tokyo_springer_2001> ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/807498784#Agent/springer> ; # Springer
    schema:url <http://swbplus.bsz-bw.de/bsz095796800cov.htm> ;
    schema:url <http://www.springerlink.com/content/dbw0cq0q9bne/> ;
    schema:url <http://swbplus.bsz-bw.de/bsz095796800kap.htm> ;
    schema:url <http://swbplus.bsz-bw.de/bsz095796800inh.htm> ;
    schema:workExample <http://worldcat.org/isbn/9783540429876> ;
    umbel:isLike <http://d-nb.info/963023012> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/76311834> ;
    .


Related Entities

<http://dbpedia.org/resource/London> # London
    a schema:Place ;
    schema:name "London" ;
    .

<http://dbpedia.org/resource/New_York_City> # New York
    a schema:Place ;
    schema:name "New York" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Series/lecture_notes_in_computer_science> # Lecture notes in computer science ;
    a bgn:PublicationSeries ;
    schema:hasPart <http://www.worldcat.org/oclc/76311834> ; # Advances in cryptology : proceedings
    schema:name "Lecture notes in computer science ;" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Topic/authentification> # authentification
    a schema:Intangible ;
    schema:name "authentification" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Topic/cryptographie_congres> # Cryptographie--Congrès
    a schema:Intangible ;
    schema:name "Cryptographie--Congrès" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Topic/identification_personne> # identification personne
    a schema:Intangible ;
    schema:name "identification personne" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Topic/protocole_cryptographique> # protocole cryptographique
    a schema:Intangible ;
    schema:name "protocole cryptographique" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Topic/securite_donnee> # sécurité donnée
    a schema:Intangible ;
    schema:name "sécurité donnée" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Topic/securite_systeme> # sécurité système
    a schema:Intangible ;
    schema:name "sécurité système" ;
    .

<http://experiment.worldcat.org/entity/work/data/807498784#Topic/systemes_informatiques_mesures_de_surete_congres> # Systèmes informatiques--Mesures de sûreté--Congrès
    a schema:Intangible ;
    schema:name "Systèmes informatiques--Mesures de sûreté--Congrès" ;
    .

<http://id.worldcat.org/fast/872484> # Computer security
    a schema:Intangible ;
    schema:name "Computer security" ;
    .

<http://id.worldcat.org/fast/884552> # Cryptography
    a schema:Intangible ;
    schema:name "Cryptography" ;
    .

<http://viaf.org/viaf/136974810> # ASIACRYPT
    a schema:Organization ;
    schema:name "ASIACRYPT" ;
    .

<http://viaf.org/viaf/70646647> # Colin Boyd
    a schema:Person ;
    schema:familyName "Boyd" ;
    schema:givenName "Colin" ;
    schema:name "Colin Boyd" ;
    .

<http://worldcat.org/isbn/9783540429876>
    a schema:ProductModel ;
    schema:isbn "3540429875" ;
    schema:isbn "9783540429876" ;
    .

<http://www.worldcat.org/title/-/oclc/76311834#PublicationEvent/berlin_heidelberg_new_york_barcelona_hong_kong_london_milan_paris_tokyo_springer_2001>
    a schema:PublicationEvent ;
    schema:location <http://experiment.worldcat.org/entity/work/data/807498784#Place/tokyo> ; # Tokyo
    schema:location <http://experiment.worldcat.org/entity/work/data/807498784#Place/milan> ; # Milan
    schema:location <http://experiment.worldcat.org/entity/work/data/807498784#Place/paris> ; # Paris
    schema:location <http://experiment.worldcat.org/entity/work/data/807498784#Place/berlin> ; # Berlin
    schema:location <http://experiment.worldcat.org/entity/work/data/807498784#Place/barcelona> ; # Barcelona
    schema:location <http://dbpedia.org/resource/New_York_City> ; # New York
    schema:location <http://experiment.worldcat.org/entity/work/data/807498784#Place/hong_kong> ; # Hong Kong
    schema:location <http://dbpedia.org/resource/London> ; # London
    schema:location <http://experiment.worldcat.org/entity/work/data/807498784#Place/heidelberg> ; # Heidelberg
    schema:organizer <http://experiment.worldcat.org/entity/work/data/807498784#Agent/springer> ; # Springer
    schema:startDate "2001" ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.