Advances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings /

This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation.

Saved in:
Bibliographic Details
Main Authors: Krawczyk, Hugo. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 1998
Subjects:Computer science., Computer communication systems., Computer security., Data encryption (Computer science)., Computers., Computer science, Management information systems., Computer Science., Data Encryption., Systems and Data Security., Theory of Computation., Discrete Mathematics in Computer Science., Computer Communication Networks., Management of Computing and Information Systems.,
Online Access:http://dx.doi.org/10.1007/BFb0055715
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:185918
record_format koha
spelling KOHA-OAI-TEST:1859182018-07-30T23:08:27ZAdvances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings / Krawczyk, Hugo. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,1998.engThis book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation.Chosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack -- Relations among notions of security for public-key encryption schemes -- Cryptography and the internet -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified approach to threshold and proactive RSA -- New efficient and secure protocols for verifiable signature sharing and other applications -- Trading correctness for privacy in unconditional multi-party computation -- Fast digital identity revocation -- Self-delegation with controlled propagation — or — What if you lose your laptop -- Identity escrow -- Generalized birthday attacks on unbalanced Feistel networks -- Quadratic relation of S-box and its application to the linear attack of full round DES -- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree -- Cryptanalysis of the Ajtai-Dwork cryptosystem -- Cryptanalysis of the Chor-Rivest cryptosystem -- Cryptanalysis of the oil and vinegar signature scheme -- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation to public-key cryptosystems -- Authentication, enhanced security and error correcting codes -- An efficient discrete log pseudo random generator -- Fast RSA-type cryptosystem modulo p k q -- An elliptic curve implementation of the finite field digital signature algorithm -- Quantum bit commitment from a physical assumption -- On concrete security treatment of signatures derived from identification -- Building PRFs from PRPs -- Security amplification by composition: The case of doubly-iterated, ideal ciphers -- On the existence of 3-round zero-knowledge protocols -- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? -- Concurrent zero-knowledge: Reducing the need for timing constraints -- The solution of McCurley's discrete log challenge -- Optimal extension fields for fast arithmetic in public-key algorithms -- Time-stamping with binary linking schemes -- Threshold traitor tracing.This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation.Computer science.Computer communication systems.Computer security.Data encryption (Computer science).Computers.Computer scienceManagement information systems.Computer Science.Data Encryption.Systems and Data Security.Theory of Computation.Discrete Mathematics in Computer Science.Computer Communication Networks.Management of Computing and Information Systems.Springer eBookshttp://dx.doi.org/10.1007/BFb0055715URN:ISBN:9783540684626
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Systems and Data Security.
Theory of Computation.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Systems and Data Security.
Theory of Computation.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
spellingShingle Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Systems and Data Security.
Theory of Computation.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Systems and Data Security.
Theory of Computation.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
Krawczyk, Hugo. editor.
SpringerLink (Online service)
Advances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings /
description This book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation.
format Texto
topic_facet Computer science.
Computer communication systems.
Computer security.
Data encryption (Computer science).
Computers.
Computer science
Management information systems.
Computer Science.
Data Encryption.
Systems and Data Security.
Theory of Computation.
Discrete Mathematics in Computer Science.
Computer Communication Networks.
Management of Computing and Information Systems.
author Krawczyk, Hugo. editor.
SpringerLink (Online service)
author_facet Krawczyk, Hugo. editor.
SpringerLink (Online service)
author_sort Krawczyk, Hugo. editor.
title Advances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings /
title_short Advances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings /
title_full Advances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings /
title_fullStr Advances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings /
title_full_unstemmed Advances in Cryptology — CRYPTO '98 [electronic resource] : 18th Annual International Cryptology Conference Santa Barbara, California, USA August 23–27, 1998 Proceedings /
title_sort advances in cryptology — crypto '98 [electronic resource] : 18th annual international cryptology conference santa barbara, california, usa august 23–27, 1998 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 1998
url http://dx.doi.org/10.1007/BFb0055715
work_keys_str_mv AT krawczykhugoeditor advancesincryptologycrypto98electronicresource18thannualinternationalcryptologyconferencesantabarbaracaliforniausaaugust23271998proceedings
AT springerlinkonlineservice advancesincryptologycrypto98electronicresource18thannualinternationalcryptologyconferencesantabarbaracaliforniausaaugust23271998proceedings
_version_ 1756265438713479168