[PDF] Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings - eBookmela

Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings

New Added
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
Likes+254
Telegram icon Share on Telegram

Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Crypto

User Rating: Be the first one!

Author: International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea), Lee, Pil Joong

Added by: sketch

Added Date: 2015-12-29

Language: eng

Subjects: Computer security, Cryptography, Sécurité informatique, Cryptographie, Cryptographie (Informatique), Cryptography, Cryptographie (Informatique), Sécurité informatique

Publishers: Berlin : Springer

Collections: journals contributions, journals

ISBN Number: 3540239758, 9783540239758

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 291.39 MB

PDF Size: 4.96 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Archive Url

Downloads: 469

Views: 519

Total Files: 18

Media Type: texts

PDF With Zip
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings

April 13, 2022

Download PDF

4.96 MB 1PDF Files

Zip Big Size
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings

April 13, 2022

Download Zip

291.39 MB 18Files

Total Files: 5

PDF
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
10 1007 b104116 pdf

Last Modified: 2015-12-29 07:42:45

Download

Size: 4.96 MB

GZ
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
10 1007 b104116 abbyy gz

Last Modified: 2015-12-29 08:39:38

Download

Size: 19.17 MB

TXT
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
10 1007 b104116 djvu txt

Last Modified: 2016-01-06 22:33:46

Download

Size: 1.38 MB

ZIP
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
10 1007 b104116 jp2 zip

Last Modified: 2015-12-29 07:47:58

Download

Size: 244.01 MB

TORRENT
Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004 : proceedings
springer 10 1007 b104116 archive torrent

Last Modified: 2023-05-26 03:17:03

Download

Size: 15.36 KB

Description

Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings
Author: Pil Joong Lee
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23975-8
DOI: 10.1007/b104116

Table of Contents:

  • On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
  • Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
  • Eliminating Random Permutation Oracles in the Even-Mansour Cipher
  • Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
  • OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
  • Stream Ciphers: Dead or Alive?
  • On the Generalized Linear Equivalence of Functions Over Finite Fields
  • Sieving Using Bucket Sort
  • Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups
  • Practical Two-Party Computation Based on the Conditional Gate
  • Privacy in Non-private Environments
  • Asynchronous Proactive Cryptosystems Without Agreement
  • Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
  • Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
  • Higher Order Universal One-Way Hash Functions
  • The MD2 Hash Function Is Not One-Way
  • New Approaches to Password Authenticated Key Exchange Based on RSA
  • Constant-Round Authenticated Group Key Exchange for Dynamic Groups
  • A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
  • Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices

Includes bibliographical references and index

You May Also Like

We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account