Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /
This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.
Main Authors: | , , |
---|---|
Format: | Texto biblioteca |
Language: | eng |
Published: |
Berlin, Heidelberg : Springer Berlin Heidelberg,
1996
|
Subjects: | Computer science., Operating systems (Computers)., Computer security., Data encryption (Computer science)., Coding theory., Computers., Algorithms., Computer Science., Theory of Computation., Data Encryption., Systems and Data Security., Coding and Information Theory., Operating Systems., Algorithm Analysis and Problem Complexity., |
Online Access: | http://dx.doi.org/10.1007/BFb0034829 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems. |
---|