Advances in cryptology, ASIACRYPT 2004 : 10th International Conference on the Theory and Application of Crypto
User Rating: Be the first one!
Author: International Conference on the Theory and Application of Cryptology and Information Security (10th : 2004 : Jeju Island, Korea), Lee, Pil Joong
Added by: sketch
Added Date: 2015-12-29
Language: eng
Subjects: Computer security, Cryptography, Sécurité informatique, Cryptographie, Cryptographie (Informatique), Cryptography, Cryptographie (Informatique), Sécurité informatique
Publishers: Berlin : Springer
Collections: journals contributions, journals
ISBN Number: 3540239758, 9783540239758
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 291.39 MB
PDF Size: 4.96 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Downloads: 469
Views: 519
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 b104116 archive torrent
Last Modified: 2023-05-26 03:17:03
Download
Size: 15.36 KB
Description
Advances in Cryptology - ASIACRYPT 2004: 10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004. Proceedings
Author: Pil Joong Lee
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23975-8
DOI: 10.1007/b104116
Table of Contents:
Includes bibliographical references and index
Author: Pil Joong Lee
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-23975-8
DOI: 10.1007/b104116
Table of Contents:
- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds
- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC
- Eliminating Random Permutation Oracles in the Even-Mansour Cipher
- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles
- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding
- Stream Ciphers: Dead or Alive?
- On the Generalized Linear Equivalence of Functions Over Finite Fields
- Sieving Using Bucket Sort
- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups
- Practical Two-Party Computation Based on the Conditional Gate
- Privacy in Non-private Environments
- Asynchronous Proactive Cryptosystems Without Agreement
- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes
- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions
- Higher Order Universal One-Way Hash Functions
- The MD2 Hash Function Is Not One-Way
- New Approaches to Password Authenticated Key Exchange Based on RSA
- Constant-Round Authenticated Group Key Exchange for Dynamic Groups
- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates
- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts