Advances in Cryptology - ASIACRYPT '96 International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings / edited by Kwangjo Kim, Tsutomu Matsumoto.

This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions...

Full description

Saved in:
Bibliographic Details
Corporate Author: SpringerLink (Online service)
Other Authors: Kim, Kwangjo (Editor), Matsumoto, Tsutomu (Editor)
Format: eBook
Language:English
Published: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1996.
Edition:1st ed. 1996.
Series:Lecture Notes in Computer Science, 1163
Springer eBook Collection.
Subjects:
Online Access:Click to view e-book
Holy Cross Note:Loaded electronically.
Electronic access restricted to members of the Holy Cross Community.

MARC

LEADER 00000nam a22000005i 4500
001 b3236338
003 MWH
005 20191028191059.0
007 cr nn 008mamaa
008 100730s1996 gw | s |||| 0|eng d
020 |a 9783540707073 
024 7 |a 10.1007/BFb0034829  |2 doi 
035 |a (DE-He213)978-3-540-70707-3 
050 4 |a E-Book 
072 7 |a UY  |2 bicssc 
072 7 |a COM014000  |2 bisacsh 
072 7 |a UY  |2 thema 
072 7 |a UYA  |2 thema 
245 1 0 |a Advances in Cryptology - ASIACRYPT '96  |h [electronic resource] :  |b International Conference on the Theory and Applications of Crypotology and Information Security, Kyongju, Korea, November 3 - 7, 1996, Proceedings /  |c edited by Kwangjo Kim, Tsutomu Matsumoto. 
250 |a 1st ed. 1996. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 1996. 
300 |a XII, 404 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1163 
490 1 |a Springer eBook Collection 
505 0 |a A message recovery signature scheme equivalent to DSA over elliptic curves -- Cryptographic protocols based on real-quadratic A-fields (extended abstract) -- Minding your p's and q's -- Authenticated multi-party key agreement -- Cryptography and the internet: Lessons and challenges -- Generating standard DSA signatures without long inversion -- A fast software implementation for arithmetic operations in GF(2n) -- Hash functions based on block ciphers and quaternary codes -- Generalized Feistel networks -- On applying linear cryptanalysis to IDEA -- A multi-recastable ticket scheme for electronic elections -- Some remarks on a receipt-free and universally verifiable Mix-type voting scheme -- Observations on non-repudiation -- On the efficiency of one-time digital signatures -- A hidden cryptographic assumption in no-transferable indentification schemes -- Electronic money and key management from global and regional points of view -- Limiting the visible space visual secret sharing schemes and their application to human identification -- Towards characterizing when information-theoretic secret key agreement is possible -- Key sharing based on the wire-tap channel type II concept with noisy main channel -- Generalization of higher order SAC to vector output Boolean functions -- On the correlation immune functions and their nonlinearity -- How to date blind signatures -- Provably secure blind signature schemes -- Cost-effective payment schemes with privacy regulation -- Mis-representation of identities in e-cash schemes and how to prevent it -- “Indirect discourse proofs”: Achieving efficient Fair Off-Line e-cash -- The validation of cryptographic algorithms -- Convertible group signatures -- How to utilize the transformability of digital signatures for solving the oracle problem -- On the risk of disruption in several multiparty signature schemes -- Correlation attacks on cascades of clock controlled shift registers -- Conditional correlation attack on nonlinear filter generators -- The cryptographic security of the syndrome decoding problem for rank distance codes -- A World Wide Number Field Sieve factoring record: On to 512 bits. 
520 |a This book constitutes the strictly refereed proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security, ASIACRYPT '96, held in Kyongju, Korea, in November 1996. The 31 revised full papers presented together with three invited contributions were carefully selected from a total of 124 submissions. The papers are organized in topical sections on discrete log based systems, efficient algorithms, hash functions and block cyphers, cryptographic protocols, signature and identification, visual secret sharing, key distribution, Boolean functions, electronic cash, special signatures, stream ciphers, and hard problems. 
590 |a Loaded electronically. 
590 |a Electronic access restricted to members of the Holy Cross Community. 
650 0 |a Computers. 
650 0 |a Data encryption (Computer science). 
650 0 |a Computer security. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Operating systems (Computers). 
650 0 |a Algorithms. 
690 |a Electronic resources (E-books) 
700 1 |a Kim, Kwangjo.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
700 1 |a Matsumoto, Tsutomu.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1163 
830 0 |a Springer eBook Collection. 
856 4 0 |u https://holycross.idm.oclc.org/login?auth=cas&url=https://doi.org/10.1007/BFb0034829  |3 Click to view e-book 
907 |a .b32363382  |b 04-18-22  |c 02-26-20 
998 |a he  |b 02-26-20  |c m  |d @   |e -  |f eng  |g gw   |h 0  |i 1 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645) 
902 |a springer purchased ebooks 
903 |a SEB-COLL 
945 |f  - -   |g 1  |h 0  |j  - -   |k  - -   |l he   |o -  |p $0.00  |q -  |r -  |s b   |t 38  |u 0  |v 0  |w 0  |x 0  |y .i21495038  |z 02-26-20 
999 f f |i 957acf46-af8b-54df-aae6-4d4ac1f6c452  |s 4c50ecba-9d90-543d-82de-4f447a3922de 
952 f f |p Online  |a College of the Holy Cross  |b Main Campus  |c E-Resources  |d Online  |e E-Book  |h Library of Congress classification  |i Elec File  |n 1