New Added

Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings

Like Score+329

Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings
Original Title Advances in cryptology : EUROCRYPT 2004 : International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004 : proceedings
Author EUROCRYPT (2004 : Interlaken, Switzerland), Cachin, Christian, Camenisch, Jan
Publication date

Topics Computers, Cryptography, Data transmission systems, Ordinateurs, Cryptographie, DonneĢes, ControĢ‚le d’acceĢ€s, Ordinateur, Cryptographie (Informatique), Transmission des donneĢes, Mesures de seĢcuriteĢ, Kryptologie, Transmission des donneĢes, Mesures de seĢcuriteĢ, Kryptologie
Publisher Berlin , New York : Springer
Collection folkscanomy_miscellaneous, folkscanomy, additional_collections
Language English
Book Type EBook
Material Type Book
File Type PDF
Downloadable Yes
Support Mobile, Desktop, Tablet
Scan Quality: Best No watermark
PDF Quality: Good
Availability Yes
Price 0.00
Submitted By
Sketch the Cow
Submit Date
Advances in Cryptology – EUROCRYPT 2004: International Conference on the Theory and Applications of Cryptographic Techniques, Interlaken, Switzerland, May 2-6, 2004. ProceedingsAuthor: Christian Cachin, Jan L. Camenisch Published by Springer Berlin Heidelberg ISBN: 978-3-540-21935-4 DOI: 10.1007/b97182Table of Contents:Efficient Private Matching and Set Intersection
Positive Results and Techniques for Obfuscation
Secure Computation of the k
Short Signatures Without Random Oracles
Sequential Aggregate Signatures from Trapdoor Permutations
On the Key-Uncertainty of Quantum Ciphers and the Computational Security of One-Way Quantum Transmission
The Exact Price for Unconditionally Secure Asymmetric Cryptography
On Generating the Initial Key in the Bounded-Storage Model
Practical Large-Scale Distributed Key Generation
Optimal Communication Complexity of Generic Multicast Key Distribution
An Uninstantiable Random-Oracle-Model Scheme for a Hybrid-Encryption Problem
Black-Box Composition Does Not Imply Adaptive Security
Chosen-Ciphertext Security from Identity-Based Encryption
Efficient Selective-ID Secure Identity-Based Encryption Without Random Oracles
Construction of Secure Random Curves of Genus 2 over Prime Fields
Projective Coordinates Leak
Security Proofs for Identity-Based Identification and Signature Schemes
Concurrent Signatures
The Hierarchy of Key Evolving Signatures and a Characterization of Proxy Signatures
Public-Key SteganographyIncludes bibliographical references and index
We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account
Reset Password
Compare items
  • Total (0)
Compare
0