Matches in Harvard for { <http://id.lib.harvard.edu/aleph/008172482/catalog> ?p ?o. }
Showing items 1 to 30 of
30
with 100 items per page.
- catalog contributor b11365893.
- catalog contributor b11365894.
- catalog created "c1999.".
- catalog date "1999".
- catalog date "c1999.".
- catalog dateCopyrighted "c1999.".
- catalog description "Computationally private information retrieval with polylogarithmic communication / Christian Cachin, Silvio Micali, and Markus Stadler -- On the concurrent composition of zero-knowledge proofs / Ransom Richardson and Joe Kilian -- Pseudorandom function tribe ensembles based on one-way permutations / Marc Fischlin -- Secure communication in broadcast channels / Yongge Wang and Yvo Desmedt -- Efficient communication-storage tradeoffs for multicast encryption / Ran Canetti, Tal Malkin, and Kobbi Nissim.".
- catalog description "Cryptanalysis of RSA with private key d Less than N⁰²̇⁹² / Dan Boneh and Glenn Durfee -- Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials / Eli Biham, Alex Biryukov, and Adi Shamir -- Software performance of universal hash functions / Wim Nevelsteen and Bart Preneel -- Lower bounds for oblivious transfer reductions / Yevgeniy Dodis and Silvio Micali -- On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions / Ivan Damgård, Joe Kilian, and Louis Salvail -- Conditional oblivious transfer and timed-release encryption / Giovanni Di Crescenzo, Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan -- An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack / Ran Canetti and Shafi Goldwasser -- Proving in zero-knowledge that a number is the product of two safe primes / Jan Camenisch and Markus Michels -- ".
- catalog description "Includes bibliographical references and index.".
- catalog description "Secure hash-and-sign signatures without the random oracle / Rosario Gennaro, Shai Halevi, and Tal Rabin -- A note on the limits of collusion-resistant watermarks / Funda Ergun, Joe Kilian, and Ravi Kumar -- Coin-based anonymous fingerprinting / Birgit Pfitzmann and Ahmad-Reza Sadeghi -- On the performance of hyperelliptic cryptosystems / Nigel P. Smart -- Fast elliptic curve algorithm combining Frobenius map and table reference to adapt to higher characteristic / Tetsutaro Kobayashi [and others] -- Comparing the MOV and FR reductions in elliptic curve cryptography / Ryuichi Harasawa [and others] -- Unbalanced oil and vinegar signature schemes / Aviad Kipnis, Jacques Patarin, and Louis Goubin -- Public-key cryptosystems based on composite degree residuosity classes / Pascal Paillier -- New public key cryptosystems based on the dependent-RSA problems / David Pointcheval -- Resistance against general iterated attacks / Serge Vaudenay -- ".
- catalog description "XOR and non-XOR differential probabilities / Philip Hawkes and Luke O'Connor -- S-boxes with controllable nonlinearity / Jung Hee Cheon, Seongtaek Chee, and Choonsik Park -- Secure distributed key generation for discrete-log based cryptosystems / Rosario Gennaro [and others] -- Efficient multiparty computations secure against an adaptive adversary / Ronald Cramer [and others] -- Distributed pseudo-random functions and KDCs / Moni Naor, Benny Pinkas, and Omer Reingold -- Improved fast correlation attacks on stream ciphers via convolutional codes / Thomas Johansson and Fredrik Jönsson -- Cryptanalysis of an identification scheme based on the permuted perceptron problem / Lars R. Knudsen and Willi Meier -- An analysis of exponentiation based on formal languages / Luke O'Connor -- Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key / Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki -- ".
- catalog extent "xii, 474 p. :".
- catalog identifier "3540658890".
- catalog isPartOf "Lecture notes in computer science, 0302-9743 ; 1592".
- catalog issued "1999".
- catalog issued "c1999.".
- catalog language "eng".
- catalog publisher "Berlin ; New York : Springer,".
- catalog subject "005.82 21".
- catalog subject "Computer security Congresses.".
- catalog subject "Cryptography Congresses.".
- catalog subject "Data encryption (Computer science) Congresses.".
- catalog subject "QA76.9.A25 E964 1999".
- catalog tableOfContents "Computationally private information retrieval with polylogarithmic communication / Christian Cachin, Silvio Micali, and Markus Stadler -- On the concurrent composition of zero-knowledge proofs / Ransom Richardson and Joe Kilian -- Pseudorandom function tribe ensembles based on one-way permutations / Marc Fischlin -- Secure communication in broadcast channels / Yongge Wang and Yvo Desmedt -- Efficient communication-storage tradeoffs for multicast encryption / Ran Canetti, Tal Malkin, and Kobbi Nissim.".
- catalog tableOfContents "Cryptanalysis of RSA with private key d Less than N⁰²̇⁹² / Dan Boneh and Glenn Durfee -- Cryptanalysis of skipjack reduced to 31 rounds using impossible differentials / Eli Biham, Alex Biryukov, and Adi Shamir -- Software performance of universal hash functions / Wim Nevelsteen and Bart Preneel -- Lower bounds for oblivious transfer reductions / Yevgeniy Dodis and Silvio Micali -- On the (im)possibility of basing oblivious transfer and bit commitment on weakened security assumptions / Ivan Damgård, Joe Kilian, and Louis Salvail -- Conditional oblivious transfer and timed-release encryption / Giovanni Di Crescenzo, Rafail Ostrovsky, and Sivaramakrishnan Rajagopalan -- An efficient threshold public key cryptosystem secure against adaptive chosen ciphertext attack / Ran Canetti and Shafi Goldwasser -- Proving in zero-knowledge that a number is the product of two safe primes / Jan Camenisch and Markus Michels -- ".
- catalog tableOfContents "Secure hash-and-sign signatures without the random oracle / Rosario Gennaro, Shai Halevi, and Tal Rabin -- A note on the limits of collusion-resistant watermarks / Funda Ergun, Joe Kilian, and Ravi Kumar -- Coin-based anonymous fingerprinting / Birgit Pfitzmann and Ahmad-Reza Sadeghi -- On the performance of hyperelliptic cryptosystems / Nigel P. Smart -- Fast elliptic curve algorithm combining Frobenius map and table reference to adapt to higher characteristic / Tetsutaro Kobayashi [and others] -- Comparing the MOV and FR reductions in elliptic curve cryptography / Ryuichi Harasawa [and others] -- Unbalanced oil and vinegar signature schemes / Aviad Kipnis, Jacques Patarin, and Louis Goubin -- Public-key cryptosystems based on composite degree residuosity classes / Pascal Paillier -- New public key cryptosystems based on the dependent-RSA problems / David Pointcheval -- Resistance against general iterated attacks / Serge Vaudenay -- ".
- catalog tableOfContents "XOR and non-XOR differential probabilities / Philip Hawkes and Luke O'Connor -- S-boxes with controllable nonlinearity / Jung Hee Cheon, Seongtaek Chee, and Choonsik Park -- Secure distributed key generation for discrete-log based cryptosystems / Rosario Gennaro [and others] -- Efficient multiparty computations secure against an adaptive adversary / Ronald Cramer [and others] -- Distributed pseudo-random functions and KDCs / Moni Naor, Benny Pinkas, and Omer Reingold -- Improved fast correlation attacks on stream ciphers via convolutional codes / Thomas Johansson and Fredrik Jönsson -- Cryptanalysis of an identification scheme based on the permuted perceptron problem / Lars R. Knudsen and Willi Meier -- An analysis of exponentiation based on formal languages / Luke O'Connor -- Dealing necessary and sufficient numbers of cards for sharing a one-bit secret key / Takaaki Mizuki, Hiroki Shizuya, and Takao Nishizeki -- ".
- catalog title "Advances in cryptology--EUROCRYPT '99 : International Conference on the Theory and Application of Cryptographic Techniques, Prague, Czech Republic, May 2-6, 1999 : proceedings / Jacques Stern (ed.)".
- catalog type "Conference proceedings. fast".
- catalog type "text".