Advances in cryptology - ASIACRYPT 2005: 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2005
|
Schriftenreihe: | Lecture notes in computer science
3788 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 701 S. graph. Darst. |
ISBN: | 9783540306849 3540306846 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV021279899 | ||
003 | DE-604 | ||
005 | 20060301 | ||
007 | t| | ||
008 | 060103s2005 gw d||| |||| 10||| eng d | ||
015 | |a 05,N48,0012 |2 dnb | ||
015 | |a 06,A02,0012 |2 dnb | ||
016 | 7 | |a 977011445 |2 DE-101 | |
020 | |a 9783540306849 |c kart. : EUR 85.60 (freier Pr.), sfr 135.50 (freier Pr.) |9 978-3-540-30684-9 | ||
020 | |a 3540306846 |c kart. : EUR 85.60 (freier Pr.), sfr 135.50 (freier Pr.) |9 3-540-30684-6 | ||
024 | 3 | |a 9783540306849 | |
028 | 5 | 2 | |a 11593447 |
035 | |a (OCoLC)255028096 | ||
035 | |a (DE-599)BVBBV021279899 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
044 | |a gw |c XA-DE-BE | ||
049 | |a DE-739 |a DE-91G |a DE-706 |a DE-83 | ||
082 | 0 | |a 005.8 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
111 | 2 | |a ASIACRYPT |n 11 |d 2005 |c Chennai |j Verfasser |0 (DE-588)10121959-3 |4 aut | |
245 | 1 | 0 | |a Advances in cryptology - ASIACRYPT 2005 |b 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings |c Bimal Roy (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2005 | |
300 | |a XIV, 701 S. |b graph. Darst. | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 3788 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2005 |z Madras |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
700 | 1 | |a Roy, Bimal |d 19XX- |e Sonstige |0 (DE-588)122492633 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 3788 |w (DE-604)BV000000607 |9 3788 | |
856 | 4 | 2 | |m Digitalisierung UBPassau |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014600914&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-014600914 |
Datensatz im Suchindex
_version_ | 1820874976885997568 |
---|---|
adam_text |
Table of Contents
Algebra and Number Theory
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
Pascal Paillier, Darnien Vergnaud
Do All Elliptic Curves of the Same Order Have the Same Difficulty of
Discrete Log?
David Jao, Stephen D. Miller, Ramarathnam Venkatesan
Adapting Density Attacks to Low-Weight Knapsacks
Phong Q. Nguyen, Jacques Stern
Efficient and Secure Elliptic Curve Point Multiplication Using
Double-Base Chains
Vassil Dimitrov, Laurent Imbert,
Pradeep Kumar Mishra
Multiparty Computation
Upper Bounds on the Communication Complexity of Optimally
Resilient Cryptographic Multiparty Computation
Martin
Graph-Decomposition-Based frameworks for Subset-Cover Broadcast
Encryption and Efficient Instantiations
Nuttapong AUrapadung, HideM Imai
Revealing Additional Information^^Two-Party Computations
Andreas Jakoby, Maciej
Zero Knowledge and Secret Sharing
Gate Evaluation Secret Sharing and Secure One-Round
Two-Party Computation
Vladimir Kolesnikov
Parallel Multi-party Computation from Linear Multi-secret Sharing
Schemes
Zhifang Zhang, Mulan Liu, Liangliang Xiao
XII Table of Contents
Updatable Zero-Knowledge Databases
Moses Liskov
Information and Quantum Theory
Simple and Tight Bounds for Information Reconciliation
and Privacy Amplification
Renato
Quantum Anonymous Transmissions
Matthias Christandl, Stephanie Wehner
Privacy and Anonymity
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Justin Brickell, Vitaly Shmatikov
Spreading Alerts Quietly and the Subgroup Escape Problem
James Aspnes,
Aleksandr YampolsMy
A Sender Verifiable Mix-Net and a New Proof of a Shuffle
Douglas
Universally Anonymizable Public-Key Encryption
Ryotaro Hayashi, Keisuke Tanaka
Cryptanalytic Techniques
Fast Computation of Large Distributions and Its
Cryptographic Applications
Alexander Maximov, Thomas Johansson
An Analysis of the XSL Algorithm
Carlos Gid,
Stream Cipher Cryptanalysis
New Applications of Time Memory Data Tradeoffs
Jin Hong, Paiash Sarkar
Linear Cryptanalysis of the
Frédéric
Table of Contents XIII
A Practical Attack on the Fixed RC4 in the WEP Mode
/.
A Near-Practical Attack Against B Mode of HBB
Joydip
Block Ciphers and Hash Functions
New Improvements of Davies-Murphy Cryptanalysis
Sébastien Kunz-Jacques, Frédéric
A Related-Key Rectangle Attack on the Full KASUMI
Eli Biham, Orr Dunkelrnan, Nathan Keller
Some Attacks Against a Double Length Hash Proposal
Lars R. Knudsen,
A Failure-Friendly Design Principle for Hash Functions
Stefan Lucks
Bilinear Maps
Identity-Based Hierarchical Strongly Key-Insulated Encryption
and Its Application
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, HideU Imai
Efficient and Provably-Secure Identity-Based Signatures and
Signcryption from Bilinear Maps
Paulo S.L.M. Barreto,
Jean-Jacques Quisquater
Verifier-Local Revocation Group Signature Schemes with Backward
Unlmkability from Bilinear Maps
Toru Nakanishi, Nobuo FunabiM
Key Agreement
Modular Security Proofs for Key Agreement Protocols
Caroline Kudla, Kenneth G. Paterson
A Simple Threshold Authenticated Key Exchange from Short Secrets
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque,
David Pointchevai
XIV Table of Contents
Examining Indistinguishability-Based Proof Models for Key
Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Provable Security
Server-Aided Verification: Theory and Practice
Marc GirauU, David Lefranc
Errors in Computational Complexity Proofe for Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Signatures
Universal Designated
Prove Knowledge of a Signature)
Joonsang Baek, Reihaneh Safavi-Naini, Willy
Efficient Designated
General Zero-Knowledge Proofs
Craig Gentry, David Molnar, Zulfikar Ramzan
Universally Convertible Directed Signatures
Fabien
Author Index |
adam_txt |
Table of Contents
Algebra and Number Theory
Discrete-Log-Based Signatures May Not Be Equivalent to Discrete Log
Pascal Paillier, Darnien Vergnaud
Do All Elliptic Curves of the Same Order Have the Same Difficulty of
Discrete Log?
David Jao, Stephen D. Miller, Ramarathnam Venkatesan
Adapting Density Attacks to Low-Weight Knapsacks
Phong Q. Nguyen, Jacques Stern
Efficient and Secure Elliptic Curve Point Multiplication Using
Double-Base Chains
Vassil Dimitrov, Laurent Imbert,
Pradeep Kumar Mishra
Multiparty Computation
Upper Bounds on the Communication Complexity of Optimally
Resilient Cryptographic Multiparty Computation
Martin
Graph-Decomposition-Based frameworks for Subset-Cover Broadcast
Encryption and Efficient Instantiations
Nuttapong AUrapadung, HideM Imai
Revealing Additional Information^^Two-Party Computations
Andreas Jakoby, Maciej
Zero Knowledge and Secret Sharing
Gate Evaluation Secret Sharing and Secure One-Round
Two-Party Computation
Vladimir Kolesnikov
Parallel Multi-party Computation from Linear Multi-secret Sharing
Schemes
Zhifang Zhang, Mulan Liu, Liangliang Xiao
XII Table of Contents
Updatable Zero-Knowledge Databases
Moses Liskov
Information and Quantum Theory
Simple and Tight Bounds for Information Reconciliation
and Privacy Amplification
Renato
Quantum Anonymous Transmissions
Matthias Christandl, Stephanie Wehner
Privacy and Anonymity
Privacy-Preserving Graph Algorithms in the Semi-honest Model
Justin Brickell, Vitaly Shmatikov
Spreading Alerts Quietly and the Subgroup Escape Problem
James Aspnes,
Aleksandr YampolsMy
A Sender Verifiable Mix-Net and a New Proof of a Shuffle
Douglas
Universally Anonymizable Public-Key Encryption
Ryotaro Hayashi, Keisuke Tanaka
Cryptanalytic Techniques
Fast Computation of Large Distributions and Its
Cryptographic Applications
Alexander Maximov, Thomas Johansson
An Analysis of the XSL Algorithm
Carlos Gid,
Stream Cipher Cryptanalysis
New Applications of Time Memory Data Tradeoffs
Jin Hong, Paiash Sarkar
Linear Cryptanalysis of the
Frédéric
Table of Contents XIII
A Practical Attack on the Fixed RC4 in the WEP Mode
/.
A Near-Practical Attack Against B Mode of HBB
Joydip
Block Ciphers and Hash Functions
New Improvements of Davies-Murphy Cryptanalysis
Sébastien Kunz-Jacques, Frédéric
A Related-Key Rectangle Attack on the Full KASUMI
Eli Biham, Orr Dunkelrnan, Nathan Keller
Some Attacks Against a Double Length Hash Proposal
Lars R. Knudsen,
A Failure-Friendly Design Principle for Hash Functions
Stefan Lucks
Bilinear Maps
Identity-Based Hierarchical Strongly Key-Insulated Encryption
and Its Application
Yumiko Hanaoka, Goichiro Hanaoka, Junji Shikata, HideU Imai
Efficient and Provably-Secure Identity-Based Signatures and
Signcryption from Bilinear Maps
Paulo S.L.M. Barreto,
Jean-Jacques Quisquater
Verifier-Local Revocation Group Signature Schemes with Backward
Unlmkability from Bilinear Maps
Toru Nakanishi, Nobuo FunabiM
Key Agreement
Modular Security Proofs for Key Agreement Protocols
Caroline Kudla, Kenneth G. Paterson
A Simple Threshold Authenticated Key Exchange from Short Secrets
Michel Abdalla, Olivier Chevassut, Pierre-Alain Fouque,
David Pointchevai
XIV Table of Contents
Examining Indistinguishability-Based Proof Models for Key
Establishment Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Provable Security
Server-Aided Verification: Theory and Practice
Marc GirauU, David Lefranc
Errors in Computational Complexity Proofe for Protocols
Kim-Kwang Raymond Choo, Colin Boyd, Yvonne Hitchcock
Signatures
Universal Designated
Prove Knowledge of a Signature)
Joonsang Baek, Reihaneh Safavi-Naini, Willy
Efficient Designated
General Zero-Knowledge Proofs
Craig Gentry, David Molnar, Zulfikar Ramzan
Universally Convertible Directed Signatures
Fabien
Author Index |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)122492633 |
author_corporate | ASIACRYPT Chennai |
author_corporate_role | aut |
author_facet | ASIACRYPT Chennai |
author_sort | ASIACRYPT Chennai |
building | Verbundindex |
bvnumber | BV021279899 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)255028096 (DE-599)BVBBV021279899 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV021279899</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20060301</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">060103s2005 gw d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">05,N48,0012</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">06,A02,0012</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">977011445</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540306849</subfield><subfield code="c">kart. : EUR 85.60 (freier Pr.), sfr 135.50 (freier Pr.)</subfield><subfield code="9">978-3-540-30684-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3540306846</subfield><subfield code="c">kart. : EUR 85.60 (freier Pr.), sfr 135.50 (freier Pr.)</subfield><subfield code="9">3-540-30684-6</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540306849</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">11593447</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)255028096</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV021279899</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">XA-DE-BE</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-739</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="n">11</subfield><subfield code="d">2005</subfield><subfield code="c">Chennai</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)10121959-3</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology - ASIACRYPT 2005</subfield><subfield code="b">11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings</subfield><subfield code="c">Bimal Roy (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2005</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 701 S.</subfield><subfield code="b">graph. Darst.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3788</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2005</subfield><subfield code="z">Madras</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Roy, Bimal</subfield><subfield code="d">19XX-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)122492633</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">3788</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">3788</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Digitalisierung UBPassau</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014600914&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-014600914</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2005 Madras gnd-content |
genre_facet | Konferenzschrift 2005 Madras |
id | DE-604.BV021279899 |
illustrated | Illustrated |
index_date | 2024-07-02T13:46:49Z |
indexdate | 2025-01-10T15:08:18Z |
institution | BVB |
institution_GND | (DE-588)10121959-3 |
isbn | 9783540306849 3540306846 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-014600914 |
oclc_num | 255028096 |
open_access_boolean | |
owner | DE-739 DE-91G DE-BY-TUM DE-706 DE-83 |
owner_facet | DE-739 DE-91G DE-BY-TUM DE-706 DE-83 |
physical | XIV, 701 S. graph. Darst. |
publishDate | 2005 |
publishDateSearch | 2005 |
publishDateSort | 2005 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ASIACRYPT 11 2005 Chennai Verfasser (DE-588)10121959-3 aut Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings Bimal Roy (ed.) Berlin [u.a.] Springer 2005 XIV, 701 S. graph. Darst. txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 3788 Literaturangaben Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2005 Madras gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Roy, Bimal 19XX- Sonstige (DE-588)122492633 oth Lecture notes in computer science 3788 (DE-604)BV000000607 3788 Digitalisierung UBPassau application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014600914&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings Lecture notes in computer science Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
subject_GND | (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)1071861417 |
title | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings |
title_auth | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings |
title_exact_search | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings |
title_exact_search_txtP | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings |
title_full | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings Bimal Roy (ed.) |
title_fullStr | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings Bimal Roy (ed.) |
title_full_unstemmed | Advances in cryptology - ASIACRYPT 2005 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings Bimal Roy (ed.) |
title_short | Advances in cryptology - ASIACRYPT 2005 |
title_sort | advances in cryptology asiacrypt 2005 11th international conference on the theory and application of cryptology and information security chennai india december 4 8 2005 proceedings |
title_sub | 11th International Conference on the Theory and Application of Cryptology and Information Security, Chennai, India, December 4 - 8, 2005 ; proceedings |
topic | Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd |
topic_facet | Kryptosystem Kryptologie Konferenzschrift 2005 Madras |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=014600914&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT asiacryptchennai advancesincryptologyasiacrypt200511thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritychennaiindiadecember482005proceedings AT roybimal advancesincryptologyasiacrypt200511thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritychennaiindiadecember482005proceedings |