Advances in cryptology CRYPTO 2000 : 20th Annual International Cryptology Conference, Santa Barbara, Californi
User Rating: Be the first one!
Author: CRYPTO (Conference) (2000 : Santa Barbara, Calif.), Bellare, Mihir, 1962-
Added by: sketch
Added Date: 2015-12-30
Language: eng
Subjects: Computer security, Cryptography
Publishers: Berlin ; New York : Springer
Collections: journals contributions, journals
ISBN Number: 3540679073
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 277.05 MB
PDF Size: 5.8 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Edition: [Elektronische Ressource]
Downloads: 314
Views: 364
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 3 540 44598 6 archive t...torrent
Last Modified: 2023-05-26 03:12:45
Download
Size: 14.94 KB
Description
Advances in Cryptology — CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20–24, 2000 Proceedings
Author: Mihir Bellare
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-67907-3
DOI: 10.1007/3-540-44598-6
Table of Contents:
Includes bibliographical references and index
Author: Mihir Bellare
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-67907-3
DOI: 10.1007/3-540-44598-6
Table of Contents:
- The XTR Public Key System
- A Chosen-Ciphertext Attack against NTRU
- Privacy Preserving Data Mining
- Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
- Parallel Reducibility for Information-Theoretically Secure Computation
- Optimistic Fair Secure Computation
- A Cryptographic Solution to a Game Theoretic Problem
- Differential Fault Attacks on Elliptic Curve Cryptosystems
- Quantum Public-Key Cryptosystems
- New Public-Key Cryptosystem Using Braid Groups
- Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
- CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
- L-collision Attacks against Randomized MACs
- On the Exact Security of Full Domain Hash
- Timed Commitments
- A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
- Provably Secure Partially Blind Signatures
- Weaknesses in the SL2(
- Fast Correlation Attacks through Reconstruction of Linear Polynomials
- Sequential Traitor Tracing
Includes bibliographical references and index
You May Also Like
We will be happy to hear your thoughts