Matches in Harvard for { <http://id.lib.harvard.edu/aleph/007444163/catalog> ?p ?o. }
Showing items 1 to 31 of
31
with 100 items per page.
- catalog contributor b10276953.
- catalog contributor b10276954.
- catalog contributor b10276955.
- catalog created "1996.".
- catalog date "1996".
- catalog date "1996.".
- catalog dateCopyrighted "1996.".
- catalog description "A message recovery signature scheme equivalent to DSA over elliptic curves / Atsuko Miyaji -- Cryptographic protocols based on real-quadratic a-fields / Ingrid Biehl, Bernd Meyer, Christoph Thiel -- Minding your p's and q's / Ross Anderson, Serge Vaudenay -- Authenticated multi-party key agreement / Mike Just, Serge Vaudenay Cryptography and the internet / Kevin S. McCurley -- Generating standard DSA signatures without long inversion / Arjen K. Lenstra -- A fast software implementation for arithmetic operations in GF(2[superscript n]) / Erik De Win .. [et al.] -- Hash functions based on block ciphers and quaternary codes / Lars Knudsen, Bart Preneel -- Generalized feistel networks / Kaisa Nyberg -- On applying linear cryptanalysis to IDEA / Philip Hawkes, Luke O'Connor -- A multi-recastable ticket scheme for electronic elections / Chun-I Fan, Chin-Laung Lei -- Some remarks on a receipt-free and universally verifiable mix-type voting scheme / Markus Michels, Patrick Horster -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Observations on non-repudiation / Jianying Zhou, Dieter Gollmann -- On the efficiency of one-time digital signatures / Daniel Bleichenbacher, Ueli Maurer -- A hidden cryptographic assumption in no-transferable identification schemes / Kouichi Sakurai -- Electronic money and key management from global and regional points of view / Shigeo Tsujii -- Limiting the visible space visual secret sharing schemes and their application to human identification / Kazukuni Kobara, Hideki Imai -- Towards characterizing when information-theoretic secret key agreement is possible / Ueli Maurer, Stefan Wolf -- Key sharing based on the wire-tap channel type II concept with noisy main channel / V. Korjik, D. Kushnir -- Generalization of higher order SAC to vector output boolean functions / Kaoru Kurosawa, Takashi Satoh -- On the correlation immune functions and their nonlinearity / Seongtaek Chee [and others] -- How to date blind signatures / Masayuki Abe, Eiichiro Fujisaki -- ".
- catalog description "Provably secure blind signature schemes / David Pointcheval, Jacques Stern -- Cost-effective payment schemes with privacy regulation / David M'Raihi -- Mis-representation of identities in E-cash schemes and how to prevent it / Agnes Chan [and others] -- "Indirect discourse proofs" / Yair Frankel, Yiannis Tsiounis, Moti Yung -- The validation of cryptographic algorithms / Jacques Stern -- Convertible group signatures / Seung Joo Kim, Sung Jun Park, Dong Ho Won -- How to utilize the transformability of digital signatures for solving the oracle problem / Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto -- On the risk of disruption in several multiparty signature schemes / Markus Michels, Patrick Horster -- Correlation attacks on cascades of clock controlled shift registers / Willi Geiselmann, Dieter Gollmann -- Conditional correlation attack on nonlinear filter generators / Sangjin Lee [and others] -- ".
- catalog description "The cryptographic security of the syndrome decoding problem for rank distance codes / Florent Chabaud, Jacques Stern -- A world wide number field sieve factoring record / James Cowie [and others].".
- catalog extent "xii, 394 p. :".
- catalog identifier "3540618724 (pbk.)".
- catalog isPartOf "Lecture notes in computer science ; 1163".
- catalog issued "1996".
- catalog issued "1996.".
- catalog language "eng".
- catalog publisher "New York : Springer,".
- catalog subject "005.8/2 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data protection Congresses.".
- catalog subject "QA76.9.A25 I5553 1996".
- catalog tableOfContents "A message recovery signature scheme equivalent to DSA over elliptic curves / Atsuko Miyaji -- Cryptographic protocols based on real-quadratic a-fields / Ingrid Biehl, Bernd Meyer, Christoph Thiel -- Minding your p's and q's / Ross Anderson, Serge Vaudenay -- Authenticated multi-party key agreement / Mike Just, Serge Vaudenay Cryptography and the internet / Kevin S. McCurley -- Generating standard DSA signatures without long inversion / Arjen K. Lenstra -- A fast software implementation for arithmetic operations in GF(2[superscript n]) / Erik De Win .. [et al.] -- Hash functions based on block ciphers and quaternary codes / Lars Knudsen, Bart Preneel -- Generalized feistel networks / Kaisa Nyberg -- On applying linear cryptanalysis to IDEA / Philip Hawkes, Luke O'Connor -- A multi-recastable ticket scheme for electronic elections / Chun-I Fan, Chin-Laung Lei -- Some remarks on a receipt-free and universally verifiable mix-type voting scheme / Markus Michels, Patrick Horster -- ".
- catalog tableOfContents "Observations on non-repudiation / Jianying Zhou, Dieter Gollmann -- On the efficiency of one-time digital signatures / Daniel Bleichenbacher, Ueli Maurer -- A hidden cryptographic assumption in no-transferable identification schemes / Kouichi Sakurai -- Electronic money and key management from global and regional points of view / Shigeo Tsujii -- Limiting the visible space visual secret sharing schemes and their application to human identification / Kazukuni Kobara, Hideki Imai -- Towards characterizing when information-theoretic secret key agreement is possible / Ueli Maurer, Stefan Wolf -- Key sharing based on the wire-tap channel type II concept with noisy main channel / V. Korjik, D. Kushnir -- Generalization of higher order SAC to vector output boolean functions / Kaoru Kurosawa, Takashi Satoh -- On the correlation immune functions and their nonlinearity / Seongtaek Chee [and others] -- How to date blind signatures / Masayuki Abe, Eiichiro Fujisaki -- ".
- catalog tableOfContents "Provably secure blind signature schemes / David Pointcheval, Jacques Stern -- Cost-effective payment schemes with privacy regulation / David M'Raihi -- Mis-representation of identities in E-cash schemes and how to prevent it / Agnes Chan [and others] -- "Indirect discourse proofs" / Yair Frankel, Yiannis Tsiounis, Moti Yung -- The validation of cryptographic algorithms / Jacques Stern -- Convertible group signatures / Seung Joo Kim, Sung Jun Park, Dong Ho Won -- How to utilize the transformability of digital signatures for solving the oracle problem / Masahiro Mambo, Kouichi Sakurai, Eiji Okamoto -- On the risk of disruption in several multiparty signature schemes / Markus Michels, Patrick Horster -- Correlation attacks on cascades of clock controlled shift registers / Willi Geiselmann, Dieter Gollmann -- Conditional correlation attack on nonlinear filter generators / Sangjin Lee [and others] -- ".
- catalog tableOfContents "The cryptographic security of the syndrome decoding problem for rank distance codes / Florent Chabaud, Jacques Stern -- A world wide number field sieve factoring record / James Cowie [and others].".
- catalog title "Advances in cryptology--ASIACRYPT '96 : International Conference on the Theory and Application of Cryptology and Information Security, Kyongju, Korea, November 3-7, 1996 : proceedings / Kwangjo Kim, Tsutomu Matsumoto, eds.".
- catalog type "Conference proceedings. fast".
- catalog type "text".