Advances in cryptology: ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2008
|
Schriftenreihe: | Lecture notes in computer science
5350 |
Schlagworte: | |
Online-Zugang: | Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 572 S. graph. Darst. 24 cm |
ISBN: | 9783540892540 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV035179734 | ||
003 | DE-604 | ||
005 | 20090114 | ||
007 | t| | ||
008 | 081125s2008 xx d||| |||| 10||| eng d | ||
015 | |a 08,N45,0006 |2 dnb | ||
016 | 7 | |a 990909603 |2 DE-101 | |
020 | |a 9783540892540 |c kart. : EUR 73.78 (freier Pr.), sfr 114.50 (freier Pr.) |9 978-3-540-89254-0 | ||
024 | 3 | |a 9783540892540 | |
028 | 5 | 2 | |a 12562770 |
035 | |a (OCoLC)276332025 | ||
035 | |a (DE-599)DNB990909603 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 |a DE-11 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 22/ger | |
082 | 0 | |a 005.8 |2 22 | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in cryptology |b ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings |c Josef Pieprzyk (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2008 | |
300 | |a XIV, 572 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 5350 | |
500 | |a Literaturangaben | ||
650 | 4 | |a Hash-Algorithmus - Kongress - Melbourne <2008> | |
650 | 4 | |a Kryptoanalyse - Kongress - Melbourne <2008> | |
650 | 4 | |a Kryptologie - Kongress - Melbourne <2008> | |
650 | 4 | |a Kryptosystem - Kongress - Melbourne <2008> | |
650 | 4 | |a Sicherheitsprotokoll - Kongress - Melbourne <2008> | |
650 | 4 | |a Computer security |v Congresses | |
650 | 4 | |a Cryptography |v Congresses | |
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2008 |z Melbourne |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Pieprzyk, Josef |d 1949- |e Sonstige |0 (DE-588)122464095 |4 oth | |
710 | 2 | |a International Association for Cryptologic Research |e Sonstige |0 (DE-588)2085597-7 |4 oth | |
711 | 2 | |a ASIACRYPT |n 14 |d 2008 |c Melbourne |j Sonstige |0 (DE-588)10364171-3 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 5350 |w (DE-604)BV000000607 |9 5350 | |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-016986509 |
Datensatz im Suchindex
_version_ | 1820875103647301632 |
---|---|
adam_text |
MICHAEL GORSKI, STEFAN LUCKS, AND THOMAS PEYRIN TABLE OF CONTENTS
MULTI-PARTY COMPUTATION MPC VS. SFE: UNCONDITIONAL AND COMPUTATIONAL
SECURITY 1 MARTIN HIRT, UELI MAURER, AND VASSILIS ZIKAS STRONGLY
MULTIPLICATIVE AND 3-MULTIPLICATIVE LINEAR SECRET SHARING SCHEINES 19
ZHIFANG ZHANG, MULAN LIU, YEOW MENG CHEE, SAN HING, AND HUAXIONG WANG
GRAPH DESIGN FOR SECURE MULTIPARTY COMPUTATION OVER NON-ABELIAN GROUPS
37 XIAOMING SUN, ANDREW CHI-CHIH YAO, AND CHRISTOPHE TARTARY INVITED
TALK SOME PERSPECTIVES ON COMPLEXITY-BASED CRYPTOGRAPHY 54 ANDREW
CHI-CHIH YAO CRYPTOGRAPHIC PROTOCOLS I A MODULAR SECURITY ANALYSIS OF
THE TLS HANDSHAKE PROTOCOL 55 P. MORRISSEY, N.P. SMART, AND B. WARINSCHI
AMBIGUOUS OPTIMISTIC FAIR EXCHANGE 74 QIONG HUANG, GUOMIN YANG, DUNCAN
S. WONG, AND WILLY SUSILO COMPACT PROOFS OF RETRIEVABILITY 90 HOVAV
SHACHAM AND BRENT WATERS ON THE SECURITY OF HB # AGAINST A
MAN-IN-THE-MIDDLE ATTACK 108 KHALED OUAFI, RAPHAEL OVERBECK, AND SERGE
VAUDENAY CRYPTOGRAPHIC HASH FUNCTIONS I HASH FUNCTIONS FROM SIGMA
PROTOCOLS AND IMPROVEMENTS TO VSH 125 MIHIR BELLARE AND TODOR RISTOV
SLIDE ATTACKS ON A CLASS OF HASH FUNCTIONS 143 BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/990909603 DIGITALISIERT DURCH XII TABLE
OF CONTENTS BASING PRFS ON CONSTANT-QUERY WEAK PRFS: MINIMIZING
ASSUMPTIONS FOR EFFICIENT SYMMETRIE CRYPTOGRAPHY 161 UELI MAURER AND
STEFANO TESSARO CRYPTOGRAPHIC PROTOCOLS II UNIVERSALLY COMPOSABLE
ADAPTIVE OBLIVIOUS TRANSFER 179 MATTHEW GREEN AND SUSAN HOHENBERGER A
LINKED-LIST APPROACH TO CRYPTOGRAPHICALLY SECURE ELECTIONS USING INSTANT
RUNOFF VOTING 198 JASON KELLER AND JOE KILIAN TOWARDS ROBUST COMPUTATION
ON ENCRYPTED DATA 216 MANOJ PRABHAKARAN AND MIKE ROSULEK EFFICIENT
PROTOCOLS FOR SET MEMBERSHIP AND RANGE PROOFS 234 JAN CAMENISCH, RAFIK
CHAABOUNI, AND ABHI SHELAT CRYPTOGRAPHIC HASH FUNCTIONS II PREIMAGE
ATTACKS ON 3, 4, AND 5-PASS HAVAL 253 YU SASAKI AND KAZUMARO AOKI HOW TO
FILL UP MERKLE-DAMGAERD HASH FUNCTIONS 272 KAN YASUDA LIMITS OF
CONSTRUCTIVE SECURITY PROOFS 290 MICHAEL BACKES AND DOMINIQUE UNRUH
PUBLIC-KEY CRYPTOGRAPHY I EFFICIENT CHOSEN CIPHERTEXT SECURE PUBLIC KEY
ENCRYPTION UNDER THE COMPUTATIONAL DIFFIE-HELLMAN ASSUMPTION 308
GOICHIRO HANAOKA AND KAORU KUROSAWA TWISTED EDWARDS CURVES REVISITED 326
HUSEYIN HISIL, KENNETH KOON-HO WONG, GARY CARTER, AND ED DAWSON ON THE
VALIDITY OF THE ^-HIDING ASSUMPTION IN CRYPTOGRAPHIC PROTOCOL TABLE OF
CONTENTS XIII LATTICE-BASED CRYPTOGRAPHY CONCURRENTLY SECURE
IDENTIFICATION SCHEINES BASED ON THE WORST-CASE HARDNESS OF LATTICE
PROBLEMS 372 AKINORI KAWACHI, KEISUKE TANAKA, AND KEITA XAGAWA RIGOROUS
AND EFFICIENT SHORT LATTICE VECTORS ENUMERATION 390 XAVIER PUJOL AND
DAMIEN STEHLE SOLVING LINEAR EQUATIONS MODULO DIVISORS: ON FACTORING
GIVEN ANY BITS 406 MATHIAS HERRMANN AND ALEXANDER MAY PRIVATE-KEY
CRYPTOGRAPHY AN INFINITE CLASS OF BALANCED FUNCTIONS WITH OPTIMAL
ALGEBRAIC IMMUNITY, GOOD IMMUNITY TO FAST ALGEBRAIC ATTACKS AND GOOD
NONLINEARITY 425 CLAUDE CARLET AND KEQIN FENG AN IMPROVED IMPOSSIBLE
DIFFERENTIAL ATTACK ON MISTY1 441 OTT DUNKELMAN AND NATHAN KELLER
PUBLIC-KEY CRYPTOGRAPHY II GENERALIZED IDENTITY BASED AND BROADCAST
ENCRYPTION SCHEMES 455 DAN BONEH AND MICHAEL HAMBURG SPEEDING UP THE
POLLARD RHO METHOD ON PRIME FIELDS 471 JUNG HEE CHEON, JIN HONG, AND
MINKYU KIM SUFFICIENT CONDITIONS FOR INTRACTABILITY OVER BLACK-BOX
GROUPS: GENERIC LOWER BOUNDS FOR GENERALIZED DL AND DH PROBLEMS 489 ANDY
RUPP, GREGOR LEANDER, ENDRE BANGERTER, ALEXANDER W. DENT, AND AHMAD-REZA
SADEGHI OAEP IS SECURE UNDER KEY-DEPENDENT MESSAGES 506 MICHAEL BACKES,
MARKUS DUERMUTH, AND DOMINIQUE UNRUH ANALYSI XIV TABLE OF CONTENTS
BREAKING THE F-FCSR-H STREAM CIPHER IN REAL TIME 557 MARTIN HELL AND
THOMAS JOHANSSON AUTHOR INDEX 571 |
adam_txt |
MICHAEL GORSKI, STEFAN LUCKS, AND THOMAS PEYRIN TABLE OF CONTENTS
MULTI-PARTY COMPUTATION MPC VS. SFE: UNCONDITIONAL AND COMPUTATIONAL
SECURITY 1 MARTIN HIRT, UELI MAURER, AND VASSILIS ZIKAS STRONGLY
MULTIPLICATIVE AND 3-MULTIPLICATIVE LINEAR SECRET SHARING SCHEINES 19
ZHIFANG ZHANG, MULAN LIU, YEOW MENG CHEE, SAN HING, AND HUAXIONG WANG
GRAPH DESIGN FOR SECURE MULTIPARTY COMPUTATION OVER NON-ABELIAN GROUPS
37 XIAOMING SUN, ANDREW CHI-CHIH YAO, AND CHRISTOPHE TARTARY INVITED
TALK SOME PERSPECTIVES ON COMPLEXITY-BASED CRYPTOGRAPHY 54 ANDREW
CHI-CHIH YAO CRYPTOGRAPHIC PROTOCOLS I A MODULAR SECURITY ANALYSIS OF
THE TLS HANDSHAKE PROTOCOL 55 P. MORRISSEY, N.P. SMART, AND B. WARINSCHI
AMBIGUOUS OPTIMISTIC FAIR EXCHANGE 74 QIONG HUANG, GUOMIN YANG, DUNCAN
S. WONG, AND WILLY SUSILO COMPACT PROOFS OF RETRIEVABILITY 90 HOVAV
SHACHAM AND BRENT WATERS ON THE SECURITY OF HB # AGAINST A
MAN-IN-THE-MIDDLE ATTACK 108 KHALED OUAFI, RAPHAEL OVERBECK, AND SERGE
VAUDENAY CRYPTOGRAPHIC HASH FUNCTIONS I HASH FUNCTIONS FROM SIGMA
PROTOCOLS AND IMPROVEMENTS TO VSH 125 MIHIR BELLARE AND TODOR RISTOV
SLIDE ATTACKS ON A CLASS OF HASH FUNCTIONS 143 BIBLIOGRAFISCHE
INFORMATIONEN HTTP://D-NB.INFO/990909603 DIGITALISIERT DURCH XII TABLE
OF CONTENTS BASING PRFS ON CONSTANT-QUERY WEAK PRFS: MINIMIZING
ASSUMPTIONS FOR EFFICIENT SYMMETRIE CRYPTOGRAPHY 161 UELI MAURER AND
STEFANO TESSARO CRYPTOGRAPHIC PROTOCOLS II UNIVERSALLY COMPOSABLE
ADAPTIVE OBLIVIOUS TRANSFER 179 MATTHEW GREEN AND SUSAN HOHENBERGER A
LINKED-LIST APPROACH TO CRYPTOGRAPHICALLY SECURE ELECTIONS USING INSTANT
RUNOFF VOTING 198 JASON KELLER AND JOE KILIAN TOWARDS ROBUST COMPUTATION
ON ENCRYPTED DATA 216 MANOJ PRABHAKARAN AND MIKE ROSULEK EFFICIENT
PROTOCOLS FOR SET MEMBERSHIP AND RANGE PROOFS 234 JAN CAMENISCH, RAFIK
CHAABOUNI, AND ABHI SHELAT CRYPTOGRAPHIC HASH FUNCTIONS II PREIMAGE
ATTACKS ON 3, 4, AND 5-PASS HAVAL 253 YU SASAKI AND KAZUMARO AOKI HOW TO
FILL UP MERKLE-DAMGAERD HASH FUNCTIONS 272 KAN YASUDA LIMITS OF
CONSTRUCTIVE SECURITY PROOFS 290 MICHAEL BACKES AND DOMINIQUE UNRUH
PUBLIC-KEY CRYPTOGRAPHY I EFFICIENT CHOSEN CIPHERTEXT SECURE PUBLIC KEY
ENCRYPTION UNDER THE COMPUTATIONAL DIFFIE-HELLMAN ASSUMPTION 308
GOICHIRO HANAOKA AND KAORU KUROSAWA TWISTED EDWARDS CURVES REVISITED 326
HUSEYIN HISIL, KENNETH KOON-HO WONG, GARY CARTER, AND ED DAWSON ON THE
VALIDITY OF THE ^-HIDING ASSUMPTION IN CRYPTOGRAPHIC PROTOCOL TABLE OF
CONTENTS XIII LATTICE-BASED CRYPTOGRAPHY CONCURRENTLY SECURE
IDENTIFICATION SCHEINES BASED ON THE WORST-CASE HARDNESS OF LATTICE
PROBLEMS 372 AKINORI KAWACHI, KEISUKE TANAKA, AND KEITA XAGAWA RIGOROUS
AND EFFICIENT SHORT LATTICE VECTORS ENUMERATION 390 XAVIER PUJOL AND
DAMIEN STEHLE SOLVING LINEAR EQUATIONS MODULO DIVISORS: ON FACTORING
GIVEN ANY BITS 406 MATHIAS HERRMANN AND ALEXANDER MAY PRIVATE-KEY
CRYPTOGRAPHY AN INFINITE CLASS OF BALANCED FUNCTIONS WITH OPTIMAL
ALGEBRAIC IMMUNITY, GOOD IMMUNITY TO FAST ALGEBRAIC ATTACKS AND GOOD
NONLINEARITY 425 CLAUDE CARLET AND KEQIN FENG AN IMPROVED IMPOSSIBLE
DIFFERENTIAL ATTACK ON MISTY1 441 OTT DUNKELMAN AND NATHAN KELLER
PUBLIC-KEY CRYPTOGRAPHY II GENERALIZED IDENTITY BASED AND BROADCAST
ENCRYPTION SCHEMES 455 DAN BONEH AND MICHAEL HAMBURG SPEEDING UP THE
POLLARD RHO METHOD ON PRIME FIELDS 471 JUNG HEE CHEON, JIN HONG, AND
MINKYU KIM SUFFICIENT CONDITIONS FOR INTRACTABILITY OVER BLACK-BOX
GROUPS: GENERIC LOWER BOUNDS FOR GENERALIZED DL AND DH PROBLEMS 489 ANDY
RUPP, GREGOR LEANDER, ENDRE BANGERTER, ALEXANDER W. DENT, AND AHMAD-REZA
SADEGHI OAEP IS SECURE UNDER KEY-DEPENDENT MESSAGES 506 MICHAEL BACKES,
MARKUS DUERMUTH, AND DOMINIQUE UNRUH ANALYSI XIV TABLE OF CONTENTS
BREAKING THE F-FCSR-H STREAM CIPHER IN REAL TIME 557 MARTIN HELL AND
THOMAS JOHANSSON AUTHOR INDEX 571 |
any_adam_object | 1 |
any_adam_object_boolean | 1 |
author_GND | (DE-588)122464095 |
building | Verbundindex |
bvnumber | BV035179734 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)276332025 (DE-599)DNB990909603 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
discipline_str_mv | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV035179734</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20090114</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">081125s2008 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">08,N45,0006</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">990909603</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783540892540</subfield><subfield code="c">kart. : EUR 73.78 (freier Pr.), sfr 114.50 (freier Pr.)</subfield><subfield code="9">978-3-540-89254-0</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783540892540</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">12562770</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)276332025</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB990909603</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology</subfield><subfield code="b">ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings</subfield><subfield code="c">Josef Pieprzyk (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2008</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 572 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5350</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Hash-Algorithmus - Kongress - Melbourne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptoanalyse - Kongress - Melbourne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptologie - Kongress - Melbourne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Kryptosystem - Kongress - Melbourne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sicherheitsprotokoll - Kongress - Melbourne <2008></subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Cryptography</subfield><subfield code="v">Congresses</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2008</subfield><subfield code="z">Melbourne</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Pieprzyk, Josef</subfield><subfield code="d">1949-</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)122464095</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Association for Cryptologic Research</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)2085597-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="n">14</subfield><subfield code="d">2008</subfield><subfield code="c">Melbourne</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)10364171-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">5350</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">5350</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-016986509</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2008 Melbourne gnd-content |
genre_facet | Konferenzschrift 2008 Melbourne |
id | DE-604.BV035179734 |
illustrated | Illustrated |
index_date | 2024-07-02T22:57:24Z |
indexdate | 2025-01-10T15:10:18Z |
institution | BVB |
institution_GND | (DE-588)2085597-7 (DE-588)10364171-3 |
isbn | 9783540892540 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-016986509 |
oclc_num | 276332025 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 DE-11 |
physical | XIV, 572 S. graph. Darst. 24 cm |
publishDate | 2008 |
publishDateSearch | 2008 |
publishDateSort | 2008 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings Josef Pieprzyk (ed.) Berlin [u.a.] Springer 2008 XIV, 572 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 5350 Literaturangaben Hash-Algorithmus - Kongress - Melbourne <2008> Kryptoanalyse - Kongress - Melbourne <2008> Kryptologie - Kongress - Melbourne <2008> Kryptosystem - Kongress - Melbourne <2008> Sicherheitsprotokoll - Kongress - Melbourne <2008> Computer security Congresses Cryptography Congresses Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2008 Melbourne gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Hash-Algorithmus (DE-588)4323071-4 s Pieprzyk, Josef 1949- Sonstige (DE-588)122464095 oth International Association for Cryptologic Research Sonstige (DE-588)2085597-7 oth ASIACRYPT 14 2008 Melbourne Sonstige (DE-588)10364171-3 oth Lecture notes in computer science 5350 (DE-604)BV000000607 5350 DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings Lecture notes in computer science Hash-Algorithmus - Kongress - Melbourne <2008> Kryptoanalyse - Kongress - Melbourne <2008> Kryptologie - Kongress - Melbourne <2008> Kryptosystem - Kongress - Melbourne <2008> Sicherheitsprotokoll - Kongress - Melbourne <2008> Computer security Congresses Cryptography Congresses Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)4323071-4 (DE-588)4709127-7 (DE-588)1071861417 |
title | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings |
title_auth | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings |
title_exact_search | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings |
title_exact_search_txtP | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings |
title_full | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings Josef Pieprzyk (ed.) |
title_fullStr | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings Josef Pieprzyk (ed.) |
title_full_unstemmed | Advances in cryptology ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings Josef Pieprzyk (ed.) |
title_short | Advances in cryptology |
title_sort | advances in cryptology asiacrypt 2008 14th international conference on the theory and application of cryptology and information security melbourne australia december 7 11 2008 proceedings |
title_sub | ASIACRYPT 2008, 14th International Conference on the Theory and Application of Cryptology and Information Security, Melbourne, Australia, December 7 - 11, 2008 ; proceedings |
topic | Hash-Algorithmus - Kongress - Melbourne <2008> Kryptoanalyse - Kongress - Melbourne <2008> Kryptologie - Kongress - Melbourne <2008> Kryptosystem - Kongress - Melbourne <2008> Sicherheitsprotokoll - Kongress - Melbourne <2008> Computer security Congresses Cryptography Congresses Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Hash-Algorithmus - Kongress - Melbourne <2008> Kryptoanalyse - Kongress - Melbourne <2008> Kryptologie - Kongress - Melbourne <2008> Kryptosystem - Kongress - Melbourne <2008> Sicherheitsprotokoll - Kongress - Melbourne <2008> Computer security Congresses Cryptography Congresses Kryptoanalyse Kryptosystem Kryptologie Hash-Algorithmus Sicherheitsprotokoll Konferenzschrift 2008 Melbourne |
url | http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=016986509&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT pieprzykjosef advancesincryptologyasiacrypt200814thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritymelbourneaustraliadecember7112008proceedings AT internationalassociationforcryptologicresearch advancesincryptologyasiacrypt200814thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritymelbourneaustraliadecember7112008proceedings AT asiacryptmelbourne advancesincryptologyasiacrypt200814thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritymelbourneaustraliadecember7112008proceedings |