Advances in cryptology - ASIACRYPT '98: International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin ; Heidelberg ; New York ; Barcelona ; Budapest u.a.
Springer
1998
|
Schriftenreihe: | Lecture notes in computer science
1514 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | XII, 436 S. graph. Darst. |
ISBN: | 3540651098 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV012163067 | ||
003 | DE-604 | ||
005 | 19981109 | ||
007 | t | ||
008 | 980915s1998 gw d||| |||| 10||| eng d | ||
016 | 7 | |a 954455843 |2 DE-101 | |
020 | |a 3540651098 |9 3-540-65109-8 | ||
035 | |a (OCoLC)471925332 | ||
035 | |a (DE-599)BVBBV012163067 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c DE | ||
049 | |a DE-91G |a DE-384 |a DE-739 |a DE-29T |a DE-188 |a DE-83 |a DE-706 | ||
050 | 0 | |a QA76.9.A25I5553 1998 | |
082 | 0 | |a 005.8 |2 21 | |
082 | 0 | |a 005.8 21 | |
084 | |a SS 1998 |0 (DE-625)143435: |2 rvk | ||
084 | |a SS 4800 |0 (DE-625)143528: |2 rvk | ||
084 | |a ST 276 |0 (DE-625)143642: |2 rvk | ||
084 | |a DAT 465f |2 stub | ||
084 | |a 28 |2 sdnb | ||
111 | 2 | |a ASIACRYPT |d 1998 |c Peking |j Verfasser |0 (DE-588)2172474-X |4 aut | |
245 | 1 | 0 | |a Advances in cryptology - ASIACRYPT '98 |b International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings |c Kazuo Ohta ... (eds.) |
264 | 1 | |a Berlin ; Heidelberg ; New York ; Barcelona ; Budapest u.a. |b Springer |c 1998 | |
300 | |a XII, 436 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 1514 | |
650 | 4 | |a Computer security - Congresses | |
650 | 4 | |a Cryptography - Congresses | |
650 | 4 | |a Data protection - Congresses | |
650 | 4 | |a Computer security -- Congresses | |
650 | 4 | |a Data protection -- Congresses | |
650 | 4 | |a Cryptography -- Congresses | |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 1998 |z Peking |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Ohta, Kazuo |e Sonstige |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 1514 |w (DE-604)BV000000607 |9 1514 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008239474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
999 | |a oai:aleph.bib-bvb.de:BVB01-008239474 |
Datensatz im Suchindex
_version_ | 1804126774590701568 |
---|---|
adam_text | CONTENTS
3XEOLF.H &U SWRV VWHPV
GENERATING RSA
MODULI WITH A PREDETERMINED PORTION ***********
ARJEN K. LENSTRA (CITIBANK, USA)
1
GENERATION OF SHARED RSA KEYS BY TWO PARTIES*************...
GUILLAUME POUPARD, JACQUES STERN (ENS, FRANCE)
11
AN ATTACK ON RSA GIVEN A SMALL FRACTION OF THE PRIVATE KEY BITS******..
DAN BONEH, GLENN DURFEE (STANFORD UNIV., USA)
YAIR FRANKEL (CERTCO, USA)
25
C
-+
*
AND HM: VARIATIONS AROUND TWO SCHEMES OF T.MATSUMOTO AND
H.IMAI..........
JACQUES PATARIN, LOUIS GOUBIN (BULL, FRANCE),
NICOLAS COURTOIS (UNIV. DE TOULON, FRANCE)
35
,QYLWHG7DON
ECC/DLP AND FACTORING-BASED CRYPTOGRAPHY: A TALE OF TWO FAMILIES****...
BURT S. KALISKI JR. (RSA LABS., USA)
50
(OOLSWLF&XUYH&U SWRV VWHPV
EFFICIENT ELLIPTIC CURVE EXPONENTIATION USING MIXED
COORDINATES..........................
HENRI COHEN (UNIV. BORDEAUX I, FRANCE),
ATSUKO MIYAJI (MEI., JAPAN),
TAKATOSHI ONO (MISRLNC., JAPAN)
51
EFFICIENT IMPLEMENTATION OF SCHOOF S ALGORITHM*************..
TETSUYA IZU, JUN KOGURE, MASAYUKI NORO,
KAZUHIRO YOKOYAMA (FUJITSU LABS, LTD., JAPAN)
66
DESIGN OF HYPERELLIPTIC CRYPTOSYSTEMS IN SMALL CHARACTERISTIC AND A
SOFTWARE
IMPLEMENTATION OVER F
2
N
***********************
YASUYUKI SAKAI (MEC., JAPAN)
KOUICHI SAKURAI (KYUSHU UNIV., JAPAN)
80
CONSTRUCTION OF SECURE ELLIPTIC CRYPTOSYSTEMS USING CM TESTS AND
LIFTINGS..........
JINKUI CHAO, OSAMU NAKAMURA, KOHJI SOBATAKA,
SHIGEO TSUJII (CHUO UNIV., JAPAN)
95
X CONTENTS
ELLIPTIC CURVE DISCRETE LOGARITHMS AND THE INDEX CALCULUS**.*..****...
JOSEPH H. SILVERMAN (BROWN UNIV., USA)
JOE SUZUKI (OSAKA UNIV., JAPAN)
110
&U SWDQDO VLV
CRYPTANALYSIS OF RIJMEN-PRENEEL TRAPDOOR CIPHER*******.****...
HONGJUN WU (NAT. UNIV. OF SINGAPORE),
FENG BAO, ROBERT H.DENG (KENT RIDGE DIGITAL LABS., SINGAPORE),
QIN-ZHONG YE (NAT. UNIV. OF SINGAPORE)
126
IMPROVED TRUNCATED DIFFERENTIAL ATTACKS ON SAFER*******...***.
HONGJUN WU (NAT. UNIV. OF SINGAPORE),
FENG BAO, ROBERT H.DENG (KENT RIDGE DIGITAL LABS., SINGAPORE),
QIN-ZHONG YE (NAT. UNIV. OF SINGAPORE)
133
OPTIMAL RESISTANCE AGAINST THE DAVIS AND MURPHY ATTACK*******.*..
THOMAS PORNIN (ENS, FRANCE)
148
6LJQDWXUH
A GROUP SIGNATURE SCHEME WITH IMPROVED EFFICIENCY******..****
JAN CAMENISCH (UNIV. OF AARHUS, DENMARK )
MARKUS MICHELS (R3 SECURITY ENGINEERING, SWITZERLAND)
160
A STUDY ON THE PROPOSED KOREAN DIGITAL SIGNATURE ALGORITHM*******.
CHAE HOON LIM (FUTURE SYSTEMS INC., KOREA)
PIL JOONG LEE (POSTECH, KOREA)
175
&U SWDQDO VLV
CRYPTANALYSIS OF THE ORIGINAL MCELIECE CRYPTOSYSTEM**********..
ANNE CANTEAUT, NICOLAS SENDRIER (INRIA PROJECT CODES, FRANCE)
187
IMPROVING THE SECURITY OF THE MCELIECE PUBLIC-KEY CRYPTOSYSTEM*****..
HUNG-MIN SUN (CHAOYANG UNIV. OF TECH., TAIWAN)
200
CRYPTANALYSIS IN PRIME ORDER SUBGROUPS OF Z
*
N
*************..
WENBO MAO (HEWLETT-PACKARD LABS., UK)
CHAE HOON LIM (FUTURE SYSTEMS INC., KOREA)
214
)LQLWH$XWRPDWD
WEAK INVERTIBILITY OF FINITE AUTOMATA AND CRYPTANALYSIS ON FAPKC****...
ZONGDUO DAI (SKLOIS, CHINA)
DING FENG YE, KWOK YAN LAM (NAT. UNIV. OF SINGAPORE, SINGAPORE)
227
CONTENTS XI
$XWKHQWLFDWLRQ&RGHV
BOUNDS AND CONSTRUCTIONS FOR MULTIRECEIVER AUTHENTICATION CODES*****..
REI SAFAVI-NAINI, HUAXIONG WANG (UNIV. OF WOLLONGONG, AUSTRALIA)
242
(OHFWURQLF&DVK
FAIROFF-LINE E-CASH MADE EASY*******************
YAIR FRANKEL (CERTCO, USA)
YIANNIS TSIOUNIS (GTE LABS., USA)
MOTI YUNG (CERTCO, USA)
257
OFF-LINE FAIR PAYMENT PROTOCOLS USING CONVERTIBLE
SIGNATURES*******
COLIN BOYD, ERNEST FOO (QUEENSLAND UNIV. OF TECH., AUSTRALIA)
271
EFFICIENT FAIR EXCHANGE WITH VERIFIABLE CONFIRMATION OF SIGNATURES*****
LIQUN CHEN (HEWLETT-PACKARD LABS., UK)
286
ADAPTIVELY SECURE OBLIVIOUS TRANSFER****************..
DONALD BEAVER (TRANSARC CORP. USA)
300
6WHDP&LSKHUV
ML-SEQUENCES OVER RINGS Z/(2
N
)*****************.......
WENFENG QI (ZIEI, CHINA)
JUNHUI YANG (ACADEMIA SINICA, CHINA)
JINGJUN ZHOU (ZIEI, CHINA)
315
ANALYSIS METHODS FOR (ALLEGED) RC4*****************
LARS R.KNUDSEN (UNIV. OF BERGEN, BELGIUM)
WILLI MEIER (HTL BRUGG-WINDISCH, BELGIUM)
BART PRENEEL, VINCENT RIJMEN, SVEN VERDOOLAEGE ( ESAT, K. U. LEUVEN,
BELGIUM)
327
REDUCED COMPLEXITY CORRELATION ATTACKS ON TWO CLOCK-CONTROLLED
GENERATORS *************************.**
THOMAS JOHANSSON (LUND UNIV., SWEDEN)
342
XII CONTENTS
&U SWRJUDSKLF3URWRFROV
A NEW AND EFFICIENT ALL-OR-NOTHING DISCLOSURE OF SECRETS PROTOCOL
..................
JULIEN P. STERN (UCL CRYPTO GROUP, BELGIUM)
357
THE BEGUIN-QUISQUATER SERVER-AIDED RSA PROTOCOL FOM CRYPTO 95 IS NOT
SECURE *****************************
PHONG NGUYEN, JACQUES STERN (ENS, FRANCE)
372
.H (VFURZ
EQUITABLE KEY ESCROW WITH LIMITED TIME SPAN (OR HOW TO ENFORCE TIME
EXPIRATION CRYPTOGRAPHICALLY)*******************...
MIKE BURMESTER (UNIV. OF LONDON, UK)
YVO DESMEDT (UNIV. OF WISCONSIN-MILWAUKEE, USA),
JENNIFER, SEBERRY (UNIV. OF WOLLONGONG, AUSTRALIA)
380
1HZ&U SWRJUDSK
AUDIO AND OPTICAL CRYPTOGRAPHY******************..
YVO DESMEDT, SHUANG HOU (UNIV. OF WISCONSIN-MILWAUKEE, USA),
JEAN-JACQUES QUISQUATER (UNIV. CATHOLIQUE DE LOUVAIN, BELGIUM)
392
,QIRUPDWLRQ7KHRU
STRONG SECURITY AGAINST ACTIVE ATTACKS IN INFORMATION-THEORETIC
SECRET-KEY
AGREEMENT***************************..
STEFAN WOLF (ETH, SWITZERLAND)
405
SOME BOUNDS AND A CONSTRUCTION FOR SECURE BROADCAST ENCRYPTION*****
KAORU KUROSAWA, TAKUYA YOSHIDA (TOKYO INSTITUTE OF TECHNOLOGY, JAPAN)
YVO DESMEDT, (UNIV. OF WISCONSIN-MILWAUKEE, USA)
M.BURMESTER(UNIV. OF LONDON, UK)
420
$XWKRU,QGH[
|
any_adam_object | 1 |
author_corporate | ASIACRYPT Peking |
author_corporate_role | aut |
author_facet | ASIACRYPT Peking |
author_sort | ASIACRYPT Peking |
building | Verbundindex |
bvnumber | BV012163067 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25I5553 1998 |
callnumber-search | QA76.9.A25I5553 1998 |
callnumber-sort | QA 276.9 A25 I5553 41998 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 1998 SS 4800 ST 276 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)471925332 (DE-599)BVBBV012163067 |
dewey-full | 005.8 005.821 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 005.8 21 |
dewey-search | 005.8 005.8 21 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02372nam a2200577 cb4500</leader><controlfield tag="001">BV012163067</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">19981109 </controlfield><controlfield tag="007">t</controlfield><controlfield tag="008">980915s1998 gw d||| |||| 10||| eng d</controlfield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">954455843</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540651098</subfield><subfield code="9">3-540-65109-8</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)471925332</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV012163067</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91G</subfield><subfield code="a">DE-384</subfield><subfield code="a">DE-739</subfield><subfield code="a">DE-29T</subfield><subfield code="a">DE-188</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-706</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25I5553 1998</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">21</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8 21</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 1998</subfield><subfield code="0">(DE-625)143435:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">SS 4800</subfield><subfield code="0">(DE-625)143528:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 276</subfield><subfield code="0">(DE-625)143642:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">28</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="d">1998</subfield><subfield code="c">Peking</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)2172474-X</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology - ASIACRYPT '98</subfield><subfield code="b">International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings</subfield><subfield code="c">Kazuo Ohta ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ; Heidelberg ; New York ; Barcelona ; Budapest u.a.</subfield><subfield code="b">Springer</subfield><subfield code="c">1998</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XII, 436 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1514</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection - Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security -- Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Data protection -- Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography -- Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">1998</subfield><subfield code="z">Peking</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Ohta, Kazuo</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">1514</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">1514</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008239474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-008239474</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 1998 Peking gnd-content |
genre_facet | Konferenzschrift 1998 Peking |
id | DE-604.BV012163067 |
illustrated | Illustrated |
indexdate | 2024-07-09T18:22:48Z |
institution | BVB |
institution_GND | (DE-588)2172474-X |
isbn | 3540651098 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-008239474 |
oclc_num | 471925332 |
open_access_boolean | |
owner | DE-91G DE-BY-TUM DE-384 DE-739 DE-29T DE-188 DE-83 DE-706 |
owner_facet | DE-91G DE-BY-TUM DE-384 DE-739 DE-29T DE-188 DE-83 DE-706 |
physical | XII, 436 S. graph. Darst. |
publishDate | 1998 |
publishDateSearch | 1998 |
publishDateSort | 1998 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ASIACRYPT 1998 Peking Verfasser (DE-588)2172474-X aut Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Kazuo Ohta ... (eds.) Berlin ; Heidelberg ; New York ; Barcelona ; Budapest u.a. Springer 1998 XII, 436 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 1514 Computer security - Congresses Cryptography - Congresses Data protection - Congresses Computer security -- Congresses Data protection -- Congresses Cryptography -- Congresses Kryptologie (DE-588)4033329-2 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 1998 Peking gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Ohta, Kazuo Sonstige oth Lecture notes in computer science 1514 (DE-604)BV000000607 1514 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008239474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Lecture notes in computer science Computer security - Congresses Cryptography - Congresses Data protection - Congresses Computer security -- Congresses Data protection -- Congresses Cryptography -- Congresses Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd |
subject_GND | (DE-588)4033329-2 (DE-588)4209132-9 (DE-588)1071861417 |
title | Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings |
title_auth | Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings |
title_exact_search | Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings |
title_full | Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Kazuo Ohta ... (eds.) |
title_fullStr | Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Kazuo Ohta ... (eds.) |
title_full_unstemmed | Advances in cryptology - ASIACRYPT '98 International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings Kazuo Ohta ... (eds.) |
title_short | Advances in cryptology - ASIACRYPT '98 |
title_sort | advances in cryptology asiacrypt 98 international conference on the theory and application of cryptology and information security beijing china october 18 22 1998 proceedings |
title_sub | International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18 - 22, 1998 ; proceedings |
topic | Computer security - Congresses Cryptography - Congresses Data protection - Congresses Computer security -- Congresses Data protection -- Congresses Cryptography -- Congresses Kryptologie (DE-588)4033329-2 gnd Kryptosystem (DE-588)4209132-9 gnd |
topic_facet | Computer security - Congresses Cryptography - Congresses Data protection - Congresses Computer security -- Congresses Data protection -- Congresses Cryptography -- Congresses Kryptologie Kryptosystem Konferenzschrift 1998 Peking |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=008239474&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT asiacryptpeking advancesincryptologyasiacrypt98internationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritybeijingchinaoctober18221998proceedings AT ohtakazuo advancesincryptologyasiacrypt98internationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritybeijingchinaoctober18221998proceedings |