Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /

This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.

Saved in:
Bibliographic Details
Main Authors: Kim, Kwangjo. editor., Matsumoto, Tsutomu. editor., SpringerLink (Online service)
Format: Texto biblioteca
Language:eng
Published: Berlin, Heidelberg : Springer Berlin Heidelberg, 1996
Subjects:Computer science., Operating systems (Computers)., Computer security., Data encryption (Computer science)., Coding theory., Computers., Algorithms., Computer Science., Theory of Computation., Data Encryption., Systems and Data Security., Coding and Information Theory., Operating Systems., Algorithm Analysis and Problem Complexity.,
Online Access:http://dx.doi.org/10.1007/BFb0034829
Tags: Add Tag
No Tags, Be the first to tag this record!
id KOHA-OAI-TEST:191809
record_format koha
institution COLPOS
collection Koha
country México
countrycode MX
component Bibliográfico
access En linea
En linea
databasecode cat-colpos
tag biblioteca
region America del Norte
libraryname Departamento de documentación y biblioteca de COLPOS
language eng
topic Computer science.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Coding theory.
Computers.
Algorithms.
Computer Science.
Theory of Computation.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer science.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Coding theory.
Computers.
Algorithms.
Computer Science.
Theory of Computation.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
Operating Systems.
Algorithm Analysis and Problem Complexity.
spellingShingle Computer science.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Coding theory.
Computers.
Algorithms.
Computer Science.
Theory of Computation.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Computer science.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Coding theory.
Computers.
Algorithms.
Computer Science.
Theory of Computation.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
Operating Systems.
Algorithm Analysis and Problem Complexity.
Kim, Kwangjo. editor.
Matsumoto, Tsutomu. editor.
SpringerLink (Online service)
Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /
description This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.
format Texto
topic_facet Computer science.
Operating systems (Computers).
Computer security.
Data encryption (Computer science).
Coding theory.
Computers.
Algorithms.
Computer Science.
Theory of Computation.
Data Encryption.
Systems and Data Security.
Coding and Information Theory.
Operating Systems.
Algorithm Analysis and Problem Complexity.
author Kim, Kwangjo. editor.
Matsumoto, Tsutomu. editor.
SpringerLink (Online service)
author_facet Kim, Kwangjo. editor.
Matsumoto, Tsutomu. editor.
SpringerLink (Online service)
author_sort Kim, Kwangjo. editor.
title Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /
title_short Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /
title_full Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /
title_fullStr Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /
title_full_unstemmed Advances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings /
title_sort advances in cryptology — asiacrypt '96 [electronic resource] : international conference on the theory and applications of cryptology and information security kyongju, korea, november 3–7, 1996 proceedings /
publisher Berlin, Heidelberg : Springer Berlin Heidelberg,
publishDate 1996
url http://dx.doi.org/10.1007/BFb0034829
work_keys_str_mv AT kimkwangjoeditor advancesincryptologyasiacrypt96electronicresourceinternationalconferenceonthetheoryandapplicationsofcryptologyandinformationsecuritykyongjukoreanovember371996proceedings
AT matsumototsutomueditor advancesincryptologyasiacrypt96electronicresourceinternationalconferenceonthetheoryandapplicationsofcryptologyandinformationsecuritykyongjukoreanovember371996proceedings
AT springerlinkonlineservice advancesincryptologyasiacrypt96electronicresourceinternationalconferenceonthetheoryandapplicationsofcryptologyandinformationsecuritykyongjukoreanovember371996proceedings
_version_ 1756266244906942464
spelling KOHA-OAI-TEST:1918092018-07-30T23:16:25ZAdvances in Cryptology — ASIACRYPT '96 [electronic resource] : International Conference on the Theory and Applications of Cryptology and Information Security Kyongju, Korea, November 3–7, 1996 Proceedings / Kim, Kwangjo. editor. Matsumoto, Tsutomu. editor. SpringerLink (Online service) textBerlin, Heidelberg : Springer Berlin Heidelberg,1996.engThis book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.A message recovery signature scheme equivalent to DSA over elliptic curves -- Cryptographic protocols based on real-quadratic A-fields (extended abstract) -- Minding your p's and q's -- Authenticated multi-party key agreement -- Cryptography and the internet: Lessons and challenges -- Generating standard DSA signatures without long inversion -- A fast software implementation for arithmetic operations in GF(2n) -- Hash functions based on block ciphers and quaternary codes -- Generalized Feistel networks -- On applying linear cryptanalysis to IDEA -- A multi-recastable ticket scheme for electronic elections -- Some remarks on a receipt-free and universally verifiable Mix-type voting scheme -- Observations on non-repudiation -- On the efficiency of one-time digital signatures -- A hidden cryptographic assumption in no-transferable indentification schemes -- Electronic money and key management from global and regional points of view -- Limiting the visible space visual secret sharing schemes and their application to human identification -- Towards characterizing when information-theoretic secret key agreement is possible -- Key sharing based on the wire-tap channel type II concept with noisy main channel -- Generalization of higher order SAC to vector output Boolean functions -- On the correlation immune functions and their nonlinearity -- How to date blind signatures -- Provably secure blind signature schemes -- Cost-effective payment schemes with privacy regulation -- Mis-representation of identities in e-cash schemes and how to prevent it -- “Indirect discourse proofs”: Achieving efficient Fair Off-Line e-cash -- The validation of cryptographic algorithms -- Convertible group signatures -- How to utilize the transformability of digital signatures for solving the oracle problem -- On the risk of disruption in several multiparty signature schemes -- Correlation attacks on cascades of clock controlled shift registers -- Conditional correlation attack on nonlinear filter generators -- The cryptographic security of the syndrome decoding problem for rank distance codes -- A World Wide Number Field Sieve factoring record: On to 512 bits.This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems.Computer science.Operating systems (Computers).Computer security.Data encryption (Computer science).Coding theory.Computers.Algorithms.Computer Science.Theory of Computation.Data Encryption.Systems and Data Security.Coding and Information Theory.Operating Systems.Algorithm Analysis and Problem Complexity.Springer eBookshttp://dx.doi.org/10.1007/BFb0034829URN:ISBN:9783540707073