Advances in cryptology - ASIACRYPT 2011: 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings
Gespeichert in:
Körperschaft: | |
---|---|
Format: | Tagungsbericht Buch |
Sprache: | English |
Veröffentlicht: |
Berlin [u.a.]
Springer
2011
|
Schriftenreihe: | Lecture notes in computer science
7073 |
Schlagworte: | |
Online-Zugang: | Inhaltstext Inhaltsverzeichnis |
Beschreibung: | Literaturangaben |
Beschreibung: | XIV, 760 S. graph. Darst. 24 cm |
ISBN: | 3642253849 9783642253843 |
Internformat
MARC
LEADER | 00000nam a2200000 cb4500 | ||
---|---|---|---|
001 | BV039739786 | ||
003 | DE-604 | ||
005 | 20111213 | ||
007 | t| | ||
008 | 111205s2011 xx d||| |||| 10||| eng d | ||
015 | |a 11,N43 |2 dnb | ||
015 | |a 11,A49 |2 dnb | ||
016 | 7 | |a 1016259980 |2 DE-101 | |
020 | |a 3642253849 |9 3-642-25384-9 | ||
020 | |a 9783642253843 |c kart. : EUR 93.09 (DE) (freier Pr.), ca. EUR 95.70 (AT) (freier Pr.), ca. sfr 116.00 (freier Pr.) |9 978-3-642-25384-3 | ||
024 | 3 | |a 9783642253843 | |
028 | 5 | 2 | |a Best.-Nr.: 86008546 |
035 | |a (OCoLC)762993546 | ||
035 | |a (DE-599)DNB1016259980 | ||
040 | |a DE-604 |b ger |e rakddb | ||
041 | 0 | |a eng | |
049 | |a DE-706 |a DE-91G |a DE-11 | ||
082 | 0 | |a 005.8 |2 22/ger | |
084 | |a 004 |2 sdnb | ||
084 | |a DAT 465f |2 stub | ||
111 | 2 | |a ASIACRYPT |n 17 |d 2011 |c Seoul |j Verfasser |0 (DE-588)16331229-1 |4 aut | |
245 | 1 | 0 | |a Advances in cryptology - ASIACRYPT 2011 |b 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings |c Dong Hoon Lee ... (eds.) |
264 | 1 | |a Berlin [u.a.] |b Springer |c 2011 | |
300 | |a XIV, 760 S. |b graph. Darst. |c 24 cm | ||
336 | |b txt |2 rdacontent | ||
337 | |b n |2 rdamedia | ||
338 | |b nc |2 rdacarrier | ||
490 | 1 | |a Lecture notes in computer science |v 7073 | |
500 | |a Literaturangaben | ||
650 | 0 | 7 | |a Kryptoanalyse |0 (DE-588)4830502-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptosystem |0 (DE-588)4209132-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Kryptologie |0 (DE-588)4033329-2 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |2 gnd |9 rswk-swf |
655 | 7 | |0 (DE-588)1071861417 |a Konferenzschrift |y 2011 |z Seoul |2 gnd-content | |
689 | 0 | 0 | |a Kryptologie |0 (DE-588)4033329-2 |D s |
689 | 0 | |5 DE-604 | |
689 | 1 | 0 | |a Kryptosystem |0 (DE-588)4209132-9 |D s |
689 | 1 | |5 DE-604 | |
689 | 2 | 0 | |a Kryptoanalyse |0 (DE-588)4830502-9 |D s |
689 | 2 | |5 DE-604 | |
689 | 3 | 0 | |a Sicherheitsprotokoll |0 (DE-588)4709127-7 |D s |
689 | 3 | |5 DE-604 | |
689 | 4 | 0 | |a Hash-Algorithmus |0 (DE-588)4323071-4 |D s |
689 | 4 | |5 DE-604 | |
700 | 1 | |a Lee, Dong-Hoon |e Sonstige |4 oth | |
710 | 2 | |a International Association for Cryptologic Research |e Sonstige |0 (DE-588)2085597-7 |4 oth | |
776 | 0 | 8 | |i Erscheint auch als |n Online-Ausgabe |z 978-3-642-253850 |
830 | 0 | |a Lecture notes in computer science |v 7073 |w (DE-604)BV000000607 |9 7073 | |
856 | 4 | 2 | |m X:MVB |q text/html |u http://deposit.dnb.de/cgi-bin/dokserv?id=3899775&prov=M&dok_var=1&dok_ext=htm |3 Inhaltstext |
856 | 4 | 2 | |m DNB Datenaustausch |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024587496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-024587496 |
Datensatz im Suchindex
_version_ | 1820875362214608896 |
---|---|
adam_text |
IMAGE 1
TABLE OF CONTENTS
LATTICES AND QUANTUM CRYPTOGRAPHY BKZ 2.0: BETTER LATTICE SECURITY
ESTIMATES 1
YUANMI CHEN AND PHONG Q. NGUYEN
FUNCTIONAL ENCRYPTION FOR INNER PRODUCT PREDICATES FROM LEARNING WITH
ERRORS 21
SHWETA AGRAWAL, DAVID MANDELL FREEMAN, AND VINOD VAIKUNTANATHAN
RANDOM ORACLES IN A QUANTUM WORLD 41
DAN BONEH, OZGUER DAGDELEN, MARC FISCHLIN, ANJA LEHMANN, CHRISTIAN
SCHAFFNER, AND MARK ZHANDRY
PUBLIC KEY ENCRYPTION I
LOSSY ENCRYPTION: CONSTRUCTIONS FROM GENERAL ASSUMPTIONS AND EFFICIENT
SELECTIVE OPENING CHOSEN CIPHERTEXT SECURITY 70
BRETT HEMENWAY, BENOIT LIBERT, RAFAIL OSTROVSKY, AND DAMIEN VERGNAUD
STRUCTURE PRESERVING CCA SECURE ENCRYPTION AND APPLICATIONS 89 JAN
CAMENISCH, KRISTIYAN HARALAMBIEV, MARKULF KOHLWEISS, JOERN LAPON, AND
VINCENT NAESSENS
DECODING RANDOM LINEAR CODES IN 0(2 OO54N ) 107
ALEXANDER MAY, ALEXANDER MEURER, AND ENRICO THOMAE
LOWER AND UPPER BOUNDS FOR DENIABLE PUBLIC-KEY ENCRYPTION 125 RIKKE
BENDLIN, JESPER BUUS NIELSEN, PETER SEBASTIAN NORDHOLT, AND CLAUDIO
ORLANDI
PUBLIC KEY ENCRYPTION II
BRIDGING BROADCAST ENCRYPTION AND GROUP KEY AGREEMENT 143 QIANHONG WU,
BO QIN, LEI ZHANG, JOSEP DOMINGO-FERRER, AND ORIOL FARRAS
ON THE JOINT SECURITY OF ENCRYPTION AND SIGNATURE, REVISITED 161 KENNETH
G. PATERSON, JACOB C.N. SCHULDT, MARTIJN STAM, AND SUSAN THOMSON
POLLY CRACKER, REVISITED 179
MARTIN R. ALBRECHT, POOYA FARSHIM, JEAN-CHARLES FAUGERE, AND LUDOVIC
PERRET
BIBLIOGRAFISCHE INFORMATIONEN HTTP://D-NB.INFO/1016259980
DIGITALISIERT DURCH
IMAGE 2
XII TABLE OF CONTENTS
DATABASE PRIVACY
OBLIVIOUS RAM WITH O((LOGIV) 3 ) WORST-CASE COST 197
ELAINE SHI, T.-H. HUBERT CHAN, EMIL STEFANOV, AND MINGFEI LI
NOISELESS DATABASE PRIVACY 215
RAGHAV BHASKAR, ABHISHEK BHOWMICK, VIPUL GOYAL, SRIVATSAN LAXMAN, AND
ABHRADEEP THAKURTA
HASH FUNCTION
THE PREIMAGE SECURITY OF DOUBLE-BLOCK-LENGTH COMPRESSION FUNCTIONS 233
FREDERIK ARMKNECHT, EWAN FLEISCHMANN, MATTHIAS KRAUSE, JOOYOUNG LEE,
MARTIJN STAM, AND JOHN STEINBERGER
REBOUND ATTACK ON JH42 252
MARIA NAYA-PLASENCIA, DENIZ TOZ, AND KEREM VARICI
SECOND-ORDER DIFFERENTIAL COLLISIONS FOR REDUCED SHA-256 270 ALEX
BIRYUKOV, MARIO LAMBERGER, FLORIAN MENDEL, AND IVICA NIKOLIC
FINDING SHA-2 CHARACTERISTICS: SEARCHING THROUGH A MINEFIELD OF
CONTRADICTIONS 288
FLORIAN MENDEL, TOMISLAV NAD, AND MARTIN SCHLAFFER
SYMMETRIC KEY ENCRYPTION
CRYPTANALYSIS OF ARMADILLO2 308
MOHAMED AHMED ABDELRAHEEM, CELINE BLONDEAU, MARIA NAYA-PLASENCIA, MARION
VIDEAU, AND ERIK ZENNER
AN EXPERIMENTALLY VERIFIED ATTACK ON FULL GRAIN-128 USING DEDICATED
RECONFIGURABLE HARDWARE 327
ITAI DINUR, TIM GUENEYSU, CHRISTOF PAAR, ADI SHAMIR, AND RALF ZIMMERMANN
BICLIQUE CRYPTANALYSIS OF THE FULL AES 344
ANDREY BOGDANOV, DMITRY KHOVRATOVICH, AND CHRISTIAN RECHBERGER
TAG SIZE DOES MATTER: ATTACKS AND PROOFS FOR THE TLS RECORD PROTOCOL 372
KENNETH G. PATERSON, THOMAS RISTENPART, AND THOMAS SHRIMPTON
IMAGE 3
TABLE OF CONTENTS XIII
ZERO KNOWLEDGE PROOF
RESETTABLE CRYPTOGRAPHY IN CONSTANT ROUNDS - THE CASE OF ZERO KNOWLEDGE
390
YI DENG, DENGGUO FENG, VIPUL GOYAL, DONGDAI LIN, AMIT SAHAI, AND MOTI
YUNG
TWO PROVERS IN ISOLATION 407
CLAUDE CREPEAU, LOUIS SALVAIL, JEAN-RAYMOND SIMARD, AND ALAIN TAPP
EFFICIENT ZERO-KNOWLEDGE ARGUMENTS FROM TWO-TIERED HOMOMORPHIC
COMMITMENTS 431
JENS GROTH
UNIVERSAL COMPOSABILITY
A FRAMEWORK FOR PRACTICAL UNIVERSALLY COMPOSABLE ZERO-KNOWLEDGE
PROTOCOLS 449
JAN CAMENISCH, STEPHAN KRENN, AND VICTOR SHOUP
NON-INTERACTIVE AND RE-USABLE UNIVERSALLY COMPOSABLE STRING COMMITMENTS
WITH ADAPTIVE SECURITY 468
MARC FISCHLIN, BENOIT LIBERT, AND MARK MANULIS
FOUNDATION
CRYPTOGRAPHY SECURE AGAINST RELATED-KEY ATTACKS AND TAMPERING 486 MIHIR
BELLARE, DAVID CASH, AND RACHEL MILLER
COUNTING POINTS ON GENUS 2 CURVES WITH REAL MULTIPLICATION 504 PIERRICK
GAUDRY, DAVID KOHEL, AND BENJAMIN SMITH
ON THE EFFICIENCY OF BIT COMMITMENT REDUCTIONS 520
SAMUEL RANELLUCCI, ALAIN TAPP, SEVERIN WINKLER, AND JUERG WULLSCHLEGER
SECURE COMMUNICATION IN MULTICAST GRAPHS 538
QIUSHI YANG AND YVO DESMEDT
SECURE COMPUTATION AND SECRET SHARING
CONSTANT-ROUND PRIVATE FUNCTION EVALUATION WITH LINEAR COMPLEXITY 556
JONATHAN KATZ AND LIOR MALKA
IMAGE 4
XIV TABLE OF CONTENTS
CONSTANT-ROUNDS, LINEAR MULTI-PARTY COMPUTATION FOR EXPONENTIATION AND
MODULO REDUCTION WITH PERFECT SECURITY 572
CHAO NING AND QIULIANG XU
COMPUTATIONAL VERIFIABLE SECRET SHARING REVISITED 590
MICHAEL BACKES, ANIKET KATE, AND ARPITA PATRA
NATURAL GENERALIZATIONS OF THRESHOLD SECRET SHARING 610
ORIOL FARRAS, CARLES PADRO, CHAOPING XING, AND AN YANG
PUBLIC KEY SIGNATURE
SEPARATING SHORT STRUCTURE-PRESERVING SIGNATURES FROM NON-INTERACTIVE
ASSUMPTIONS 628
MASAYUKI ABE, JENS GROTH, AND MIYAKO OHKUBO
SHORT SIGNATURES FROM WEAKER ASSUMPTIONS 647
DENNIS HOFHEINZ, TIBOR JAGER, AND EIKE KILTZ
PRACTICAL KEY-RECOVERY FOR ALL POSSIBLE PARAMETERS OF SFLASH 667 CHARLES
BOUILLAGUET, PIERRE-ALAIN FOUQUE, AND GILLES MACARIO-RAT
LEAKAGE RESILIENT CRYPTOGRAPHY
THE LEAKAGE-RESILIENCE LIMIT OF A COMPUTATIONAL PROBLEM IS EQUAL TO ITS
UNPREDICTABILITY ENTROPY 686
DIVESH AGGARWAL AND UELI MAURER
LEAKAGE-RESILIENT CRYPTOGRAPHY FROM THE INNER-PRODUCT EXTRACTOR 702
STEFAN DZIEMBOWSKI AND SEBASTIAN FAUST
PROGRAM OBFUSCATION WITH LEAKY HARDWARE 722
NIR BITANSKY, RAN CANETTI, SHAFI GOLDWASSER, SHAI HALEVI, YAEL TAUMAN
KALAI, AND GUY N. ROTHBLUM
BITR: BUILT-IN TAMPER RESILIENCE 740
STUNG GEOL CHOI, AGGELOS KIAYIAS, AND TAL MALKIN
AUTHOR INDEX 759 |
any_adam_object | 1 |
author_corporate | ASIACRYPT Seoul |
author_corporate_role | aut |
author_facet | ASIACRYPT Seoul |
author_sort | ASIACRYPT Seoul |
building | Verbundindex |
bvnumber | BV039739786 |
classification_rvk | SS 4800 |
classification_tum | DAT 465f |
ctrlnum | (OCoLC)762993546 (DE-599)DNB1016259980 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Conference Proceeding Book |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nam a2200000 cb4500</leader><controlfield tag="001">BV039739786</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20111213</controlfield><controlfield tag="007">t|</controlfield><controlfield tag="008">111205s2011 xx d||| |||| 10||| eng d</controlfield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,N43</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="015" ind1=" " ind2=" "><subfield code="a">11,A49</subfield><subfield code="2">dnb</subfield></datafield><datafield tag="016" ind1="7" ind2=" "><subfield code="a">1016259980</subfield><subfield code="2">DE-101</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">3642253849</subfield><subfield code="9">3-642-25384-9</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783642253843</subfield><subfield code="c">kart. : EUR 93.09 (DE) (freier Pr.), ca. EUR 95.70 (AT) (freier Pr.), ca. sfr 116.00 (freier Pr.)</subfield><subfield code="9">978-3-642-25384-3</subfield></datafield><datafield tag="024" ind1="3" ind2=" "><subfield code="a">9783642253843</subfield></datafield><datafield tag="028" ind1="5" ind2="2"><subfield code="a">Best.-Nr.: 86008546</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)762993546</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)DNB1016259980</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rakddb</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-706</subfield><subfield code="a">DE-91G</subfield><subfield code="a">DE-11</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22/ger</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">004</subfield><subfield code="2">sdnb</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">DAT 465f</subfield><subfield code="2">stub</subfield></datafield><datafield tag="111" ind1="2" ind2=" "><subfield code="a">ASIACRYPT</subfield><subfield code="n">17</subfield><subfield code="d">2011</subfield><subfield code="c">Seoul</subfield><subfield code="j">Verfasser</subfield><subfield code="0">(DE-588)16331229-1</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Advances in cryptology - ASIACRYPT 2011</subfield><subfield code="b">17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings</subfield><subfield code="c">Dong Hoon Lee ... (eds.)</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin [u.a.]</subfield><subfield code="b">Springer</subfield><subfield code="c">2011</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">XIV, 760 S.</subfield><subfield code="b">graph. Darst.</subfield><subfield code="c">24 cm</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">n</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">nc</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7073</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Literaturangaben</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="0">(DE-588)1071861417</subfield><subfield code="a">Konferenzschrift</subfield><subfield code="y">2011</subfield><subfield code="z">Seoul</subfield><subfield code="2">gnd-content</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Kryptologie</subfield><subfield code="0">(DE-588)4033329-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="1" ind2="0"><subfield code="a">Kryptosystem</subfield><subfield code="0">(DE-588)4209132-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="1" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="2" ind2="0"><subfield code="a">Kryptoanalyse</subfield><subfield code="0">(DE-588)4830502-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="2" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="3" ind2="0"><subfield code="a">Sicherheitsprotokoll</subfield><subfield code="0">(DE-588)4709127-7</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="3" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="689" ind1="4" ind2="0"><subfield code="a">Hash-Algorithmus</subfield><subfield code="0">(DE-588)4323071-4</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="4" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Lee, Dong-Hoon</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">International Association for Cryptologic Research</subfield><subfield code="e">Sonstige</subfield><subfield code="0">(DE-588)2085597-7</subfield><subfield code="4">oth</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Online-Ausgabe</subfield><subfield code="z">978-3-642-253850</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Lecture notes in computer science</subfield><subfield code="v">7073</subfield><subfield code="w">(DE-604)BV000000607</subfield><subfield code="9">7073</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">X:MVB</subfield><subfield code="q">text/html</subfield><subfield code="u">http://deposit.dnb.de/cgi-bin/dokserv?id=3899775&prov=M&dok_var=1&dok_ext=htm</subfield><subfield code="3">Inhaltstext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">DNB Datenaustausch</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024587496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-024587496</subfield></datafield></record></collection> |
genre | (DE-588)1071861417 Konferenzschrift 2011 Seoul gnd-content |
genre_facet | Konferenzschrift 2011 Seoul |
id | DE-604.BV039739786 |
illustrated | Illustrated |
indexdate | 2025-01-10T15:14:26Z |
institution | BVB |
institution_GND | (DE-588)16331229-1 (DE-588)2085597-7 |
isbn | 3642253849 9783642253843 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-024587496 |
oclc_num | 762993546 |
open_access_boolean | |
owner | DE-706 DE-91G DE-BY-TUM DE-11 |
owner_facet | DE-706 DE-91G DE-BY-TUM DE-11 |
physical | XIV, 760 S. graph. Darst. 24 cm |
publishDate | 2011 |
publishDateSearch | 2011 |
publishDateSort | 2011 |
publisher | Springer |
record_format | marc |
series | Lecture notes in computer science |
series2 | Lecture notes in computer science |
spelling | ASIACRYPT 17 2011 Seoul Verfasser (DE-588)16331229-1 aut Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings Dong Hoon Lee ... (eds.) Berlin [u.a.] Springer 2011 XIV, 760 S. graph. Darst. 24 cm txt rdacontent n rdamedia nc rdacarrier Lecture notes in computer science 7073 Literaturangaben Kryptoanalyse (DE-588)4830502-9 gnd rswk-swf Kryptosystem (DE-588)4209132-9 gnd rswk-swf Kryptologie (DE-588)4033329-2 gnd rswk-swf Hash-Algorithmus (DE-588)4323071-4 gnd rswk-swf Sicherheitsprotokoll (DE-588)4709127-7 gnd rswk-swf (DE-588)1071861417 Konferenzschrift 2011 Seoul gnd-content Kryptologie (DE-588)4033329-2 s DE-604 Kryptosystem (DE-588)4209132-9 s Kryptoanalyse (DE-588)4830502-9 s Sicherheitsprotokoll (DE-588)4709127-7 s Hash-Algorithmus (DE-588)4323071-4 s Lee, Dong-Hoon Sonstige oth International Association for Cryptologic Research Sonstige (DE-588)2085597-7 oth Erscheint auch als Online-Ausgabe 978-3-642-253850 Lecture notes in computer science 7073 (DE-604)BV000000607 7073 X:MVB text/html http://deposit.dnb.de/cgi-bin/dokserv?id=3899775&prov=M&dok_var=1&dok_ext=htm Inhaltstext DNB Datenaustausch application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024587496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis |
spellingShingle | Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings Lecture notes in computer science Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
subject_GND | (DE-588)4830502-9 (DE-588)4209132-9 (DE-588)4033329-2 (DE-588)4323071-4 (DE-588)4709127-7 (DE-588)1071861417 |
title | Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings |
title_auth | Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings |
title_exact_search | Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings |
title_full | Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings Dong Hoon Lee ... (eds.) |
title_fullStr | Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings Dong Hoon Lee ... (eds.) |
title_full_unstemmed | Advances in cryptology - ASIACRYPT 2011 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings Dong Hoon Lee ... (eds.) |
title_short | Advances in cryptology - ASIACRYPT 2011 |
title_sort | advances in cryptology asiacrypt 2011 17th international conference on the theory and application of cryptology and information security seoul south korea december 4 8 2011 proceedings |
title_sub | 17th international conference on the theory and application of cryptology and information security, Seoul, South Korea, December 4 - 8, 2011 ; proceedings |
topic | Kryptoanalyse (DE-588)4830502-9 gnd Kryptosystem (DE-588)4209132-9 gnd Kryptologie (DE-588)4033329-2 gnd Hash-Algorithmus (DE-588)4323071-4 gnd Sicherheitsprotokoll (DE-588)4709127-7 gnd |
topic_facet | Kryptoanalyse Kryptosystem Kryptologie Hash-Algorithmus Sicherheitsprotokoll Konferenzschrift 2011 Seoul |
url | http://deposit.dnb.de/cgi-bin/dokserv?id=3899775&prov=M&dok_var=1&dok_ext=htm http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=024587496&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |
volume_link | (DE-604)BV000000607 |
work_keys_str_mv | AT asiacryptseoul advancesincryptologyasiacrypt201117thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecurityseoulsouthkoreadecember482011proceedings AT leedonghoon advancesincryptologyasiacrypt201117thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecurityseoulsouthkoreadecember482011proceedings AT internationalassociationforcryptologicresearch advancesincryptologyasiacrypt201117thinternationalconferenceonthetheoryandapplicationofcryptologyandinformationsecurityseoulsouthkoreadecember482011proceedings |