Advances in cryptology: ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings
Gespeichert in:
Format: | Tagungsbericht Buch |
---|---|
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2010
|
Schriftenreihe: | Lecture notes in computer science
6477 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 634 S. graph. Darst. 24 cm |
ISBN: | 9783642173721 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV036801941 | ||
003 | DE-604 | ||
005 | 20110131 | ||
007 | t| | ||
008 | 101129s2010 xx d||| |||| 10||| eng d | ||
015 | |a 10,N43 |2 dnb | ||
016 | 7 | |a 1007777435 |2 DE-101 | |
020 | |a 9783642173721 |c kart. : EUR 84.53 (DE) (freier Pr.), sfr 113.50 (freier Pr.) |9 978-3-642-17372-1 | ||
024 | 3 | |a 9783642173721 | |
028 | 5 | 2 | |a Best.-Nr.: 80027359 |
035 | |a (OCoLC)690910608 | ||
035 | |a (DE-599)DNB1007777435 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-83 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
245 | 1 | 0 | |a Advances in cryptology |b ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings |c Masayuki Abe (ed.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2010 | |
300 | |a XIV, 634 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 6477 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2010 |z Singapur |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Abe, Masayuki |e Sonstige |4 oth | |
711 | 2 | |a ASIACRYPT |n 16 |d 2010 |c Singapur |j Sonstige |0 (DE-588)16091052-3 |4 oth | |
830 | 0 | |a Lecture notes in computer science |v 6477 |w (DE-604)BV000000607 |9 6477 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3552144&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718099&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-020718099 |
Datensatz im Suchindex
_version_ | 1820875282790219776 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
HASH ATTACKS ROTATIONAL REBOUND ATTACKS ON REDUCED SKEIN 1
DMITRY KHOVRATOVICH, IVICA NIKOLIC, AND CHRISTIAN RECHBERGER
FINDING SECOND PREIMAGES OF SHORT MESSAGES FOR HAMSI-256 20 THOMAS FUHR
NON-FULL-ACTIVE SUPER-SBOX ANALYSIS: APPLICATIONS TO ECHO AND GR0STL 38
YU SASAKI, YANG LI, LEI WANG, KAZUO SAKIYAMA. AND KAZUO OHTA
ADVANCED MEET-IN-THE-MIDDLE PREIMAGE ATTACKS: FIRST RESULTS ON FULL
TIGER, AND IMPROVED RESULTS ON MD4 AND SHA-2 56
JIAN GUO, SAN LING. CHRISTIAN RECHBERGER. AND HUAXIONG WANG
COLLISION ATTACKS AGAINST THE KNUDSEN-PRENEEL COMPRESSION FUNCTIONS 76
ONUR OZEN AND MARTIJN STAM
SYMMETRIC-KEY CRYPTOSYSTEMS
IMPROVED GENERIC ATTACKS ON UNBALANCED FEISTEL SCHEMES WITH EXPANDING
FUNCTIONS 94
EMMANUEL VOLTE, VALERIE NACHEF. AND JACQUES PATARIN
THE WORLD IS NOT ENOUGH: ANOTHER LOOK ON SECOND-ORDER DPA 112
FRANGOIS-XAVIER STANDAERT, NICOLAS VEYRAT-CHARVILLON. ELISABETH OSWALD,
BENEDIKT GIERLICHS. MARCEL MEDWED. MARKUS KASPER, AND STEFAN MANGARD
BLOCK AND STREAM CIPHERS
CONDITIONAL DIFFERENTIAL CRYPTANALYSIS OF NLFSR-BASED CRYPTOSYSTEMS 130
SIM ON KNELLWOLF. WILLI MEIER, AND MARIA NAYA-PLASENCIA
A BYTE-BASED GUESS AND DETERMINE ATTACK ON SOSEMANUK 146 XIUTAO FENG.
JUN LIU. ZHAOCUN ZHOU. CHUANKUN WU. AND DENGGUO FENG
IMPROVED SINGLE-KEY ATTACKS ON 8-ROUND AES-192 AND AES-236 LOS ORR
DUNKELMAN. NATHAN KEILER, AND ADI SHAMIR
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1007777435
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
PROTOCOLS
C O N S T A N T - S I ZE C O M M I T M E N TS TO P O L Y N O M I A LS A
ND T H E IR A P P L I C A T I O NS . . . 1 77
ANIKET KATE, GREGORY M. ZAVERUCHA, AND IAN GOLDBERG
COMPUTATIONALLY SECURE PATTERN MATCHING IN THE PRESENCE OF MALICIOUS
ADVERSARIES 195
CARMIT HAZAY AND TOMAS TOFT
LINEAR-COMPLEXITY PRIVATE SET INTERSECTION PROTOCOLS SECURE IN MALICIOUS
MODEL 213
EMILIANO DE CRISTOFARO, JIHYE KIM, AND GENE TSUDIK
KEY EXCHANGE
GENERIC COMPILERS FOR AUTHENTICATED KEY EXCHANGE 232
TIBOR JAGER, FLORIAN KOHLAR, SVEN SCHAGE, AND JOERG SCHWENK
A FORWARD-SECURE SYMMETRIC-KEY DERIVATION PROTOCOL: HOW TO IMPROVE
CLASSICAL DUKPT .". * 250
ERIC BRIER AND THOMAS PEYRIN
FOUNDATION
EFFICIENT STRING-COMMITMENT FROM WEAK BIT-COMMITMENT 268 KAI-MIN CHUNG.
FENG-HAO LM, CM-JEN LU, AND BO- YIN YANG
ON THE STATIC DIFFIE-HELLMAN PROBLEM ON ELLIPTIC CURVES OVER EXTENSION
FIELDS 283
ROBERT GRANGER
RAIIDOM ORACLES WITH(OUT) PROGRAMMABILITY 303
MARE FISCHLIN, ANJA LEHMANN. THOMAS RISTENPART, THOMAS SHRIMPTON,
MARTIJN STAM. AND STEFANO TESSARO
ZERO-KNOWLEDGE
SHORT PAIRING-BASED NON-INTERACTIVE ZERO-KNOWLEDGE ARGUMENTS 321 JENS
GROTH
SHORT NON-INTERACTIVE ZERO-KNOWLEDGE PROOFS 341
JENS GROTH
OPTIMISTIC CONCURRENT ZERO KNOWLEDGE 359
ALON ROAE.N AND ABHI SHELAT
IMAGE 3
TAB IE OF OONTENTS XIII
LATTICE-BASED CRYPTOGRAPHY
FASTER FULLY HOMOMORPHIC ENCRYPTION 377
DAMIEN STEHLE AND RON STEINFELD
A GROUP SIGNATURE SCHEME FROM LATTICE ASSUMPTIONS 395
S. DOV GORDON, JONATHAN KATZ, AND VINOD VAIKUNTANATHAN
LATTICE-BASED BLIND SIGNATURES 413
MARKUS RUECKERT
SECURE COMMUNICATION AND COMPUTATION
THE ROUND COMPLEXITY OF VERIFIABLE SECRET SHARING: THE STATISTICAL CASE
431
RANJIT KUMARESAN, ARPITA PATRA. AND C. PANDU RANGAN
G E N E R AL P E R F E C T LY S E C U RE M E S S A GE T R A N S M I S S
I ON U S I NG L I N E AR C O D ES . . . 4 4»
QIUSHI YANG AND YVO DESMEDT
ON INVERTIBLE SAMPLING AND ADAPTIVE SECURITY 466
YUVAL ISHAI, ABISHEK KUMARASUBRAMANIAN. CLAUDIO ORLANDI. AND AMIT SAHAI
MULTIPARTY COMPUTATION FOR MODULO REDUCTION WITHOUT BIT-DECOMPOSITION
AND A GENERALIZATION TO BIT-DECOMPOSITION 483 CHAO NING AND QIULIANG XU
MODELS, NOTIONS, AND ASSUMPTIONS
A CLOSER LOOK AT ANONYMITY AND ROBUSTNESS IN ENCRYPTION SCHEMES . . .
501 PAYMAN MOHASSEL
LIMITATIONS ON TRANSFORMATIONS FROM COMPOSITE-ORDER TO PRIME-ORDER
GROUPS: THE CASE OF ROUND-OPTIMAL BLIND SIGNATURES 519
SARAH MEIKLEJOHN, HOVAV SHACHAM. AND DAVID MANDELL FREEMAN
THE SEMI-GENERIC GROUP MODEL AND APPLICATIONS TO PAIRING-BASED
CRYPTOGRAPHY 53!)
TIBOR JAGER AND ANDY RUPP
PUBLIC-KEY ENCRYPTION
THE DEGREE OF REGULARITY OF HFE SYSTEMS 557
VIVIEN DUBOIS AND NIC.OLAS GAMN
STRUCTURED ENCRYPTION AND CONTROLLED DISCLOSURE . . MELISSA CHASE AND
SENY KAM ARA
IMAGE 4
XIV TABLE OF CONTENTS
LEAKAGE RESILIENT EIGAMAL ENCRYPTION 595
EIKE KILTZ AND KRZYSZTOF PIETRZAK
EFFICIENT PUBLIC-KEY CRYPTOGRAPHY IN THE PRESENCE OF KEY LEAKAGE 613
YEVGENIY DODIS, KRISTIYAN HARALAMBIEV, ADRIANA LOPEZ-ALT, AND DANIEL
WICHS
AUTHOR INDEX 633 |
any_adam_object | 1 |
building | Verbundindex |
bvnumber | BV036801941 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)690910608 (DE-599)DNB1007777435 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV036801941</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20110131</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">101129s2010 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">10,N43</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1007777435</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642173721</subfield><subfield code="c">kart. : EUR 84.53 (DE) (freier Pr.), sfr 113.50 (freier Pr.)</subfield><subfield code="9">978-3-642-17372-1</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642173721</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 80027359</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)690910608</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1007777435</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology</subfield><subfield code="b">ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings</subfield><subfield code="c">Masayuki Abe (ed.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2010</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 634 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6477</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2010</subfield><subfield code="z">Singapur</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Abe, Masayuki</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="711" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="n">16</subfield><subfield code="d">2010</subfield><subfield code="c">Singapur</subfield><subfield code="j">Sonstige</subfield><subfield code="0">(DE-588)16091052-3</subfield><subfield code="4">oth</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">6477</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">6477</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3552144&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718099&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-020718099</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2010 Singapur gnd-content |
genre_facet | Konferenzschrift 2010 Singapur |
id | DE-604.BV036801941 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:13:10Z |
institution | BVB |
institution_GND | (DE-588)16091052-3 |
isbn | 9783642173721 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-020718099 |
oclc_num | 690910608 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-83 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-83 |
physical | XIV, 634 S. graph. Darst. 24 cm |
publishDate | 2010 |
publishDateSearch | 2010 |
publishDateSort | 2010 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings Masayuki Abe (ed.) Berlin [u.a.] Springer 2010 XIV, 634 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 6477 Literaturangaben Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2010 Singapur gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Hash-Algorithmus (DE-588)4323071-4 s Abe, Masayuki Sonstige oth ASIACRYPT 16 2010 Singapur Sonstige (DE-588)16091052-3 oth Lecture notes in computer science 6477 (DE-604)BV000000607 6477 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3552144&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718099&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings Lecture notes in computer science Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)4323071-4 (DE-588)4709127-7 (DE-588)1071861417 |
title | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings |
title_auth | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings |
title_exact_search | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings |
title_full | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings Masayuki Abe (ed.) |
title_fullStr | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings Masayuki Abe (ed.) |
title_full_unstemmed | Advances in cryptology ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings Masayuki Abe (ed.) |
title_short | Advances in cryptology |
title_sort | advances in cryptology asiacrypt 2010 16th international conference on the theory and application of cryptology and information security singapore december 5 9 2010 proceedings |
title_sub | ASIACRYPT 2010, 16th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 5 - 9, 2010 ; proceedings |
topic | Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Kryptoanalyse Kryptosystem Kryptologie Hash-Algorithmus Sicherheitsprotokoll Konferenzschrift 2010 Singapur |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3552144&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=020718099&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT abemasayuki advancesincryptologyasiacrypt201016thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritysingaporedecember592010proceedings AT asiacryptsingapur advancesincryptologyasiacrypt201016thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecuritysingaporedecember592010proceedings |