[PDF] Advances in cryptology - ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings - eBookmela

Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings

New Added
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
Likes+254
Telegram icon Share on Telegram

Advances in cryptology ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Crypto

User Rating: Be the first one!

Author: International Conference on the Theory and Application of Cryptology and Information Security (6th : 2000 : Kyoto, Japan), Okamoto, Tatsuaki

Added by: sketch

Added Date: 2015-12-30

Language: eng

Subjects: Computer security, Cryptography

Publishers: Berlin ; New York : Springer

Collections: journals contributions, journals

ISBN Number: 3540414045

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 347.07 MB

PDF Size: 5.89 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Edition: [Elektronische Ressource]

Archive Url

Downloads: 263

Views: 313

Total Files: 18

Media Type: texts

PDF With Zip
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings

April 12, 2022

Download PDF

5.89 MB 1PDF Files

Zip Big Size
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings

April 12, 2022

Download Zip

347.07 MB 18Files

Total Files: 5

PDF
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
10 1007 3 540 44448 3 pdf

Last Modified: 2015-12-30 03:52:15

Download

Size: 5.89 MB

GZ
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
10 1007 3 540 44448 3 abbyy gz

Last Modified: 2015-12-30 05:55:52

Download

Size: 22.17 MB

TXT
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
10 1007 3 540 44448 3 djvu txt

Last Modified: 2016-01-06 20:08:42

Download

Size: 186.27 KB

ZIP
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
10 1007 3 540 44448 3 jp2 zip

Last Modified: 2015-12-30 04:04:01

Download

Size: 293.74 MB

TORRENT
Advances in cryptology – ASIACRYPT 2000 : 6th International Conference on the Theory and Application of Cryptology and Information Security, Singapore, December 3-7, 2000 : proceedings
springer 10 1007 3 540 44448 3 archive t...torrent

Last Modified: 2023-05-26 03:11:04

Download

Size: 17.67 KB

Description

Advances in Cryptology — ASIACRYPT 2000: 6th International Conference on the Theory and Application of Cryptology and Information Security Kyoto, Japan, December 3–7, 2000 Proceedings
Author: Tatsuaki Okamoto
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-41404-9
DOI: 10.1007/3-540-44448-3

Table of Contents:

  • Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers
  • Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt ’99
  • Why Textbook ElGamal and RSA Encryption Are Insecure
  • Cryptanalysis of the TTM Cryptosystem
  • Attacking and Repairing Batch Verification Schemes
  • Cryptography Everywhere
  • Security of Signed ElGamal Encryption
  • From Fixed-Length to Arbitrary-Length RSA Padding Schemes
  • Towards Signature-Only Signature Schemes
  • A New Forward-Secure Digital Signature Scheme
  • Unconditionally Secure Digital Signature Schemes Admitting Transferability
  • Efficient Secure Multi-party Computation
  • Mix and Match: Secure Function Evaluation via Ciphertexts
  • A Length-Invariant Hybrid Mix
  • Attack for Flash MIX
  • Distributed Oblivious Transfer
  • Key Improvements to XTR
  • Security of Cryptosystems Based on Class Groups of Imaginary Quadratic Orders
  • Weil Descent of Elliptic Curves over Finite Fields of Characteristic Three
  • Construction of Hyperelliptic Curves with CM and Its Application to Cryptosystems

Includes bibliographical references and index

You May Also Like

We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account