[PDF] Advances in cryptology - EUROCRYPT .. - eBookmela

Advances in cryptology – EUROCRYPT ..

New Added
Advances in cryptology – EUROCRYPT ..
Likes+254
Telegram icon Share on Telegram

Advances in cryptology EUROCRYPT ..

User Rating: Be the first one!

Author: EUROCRYPT, Chaum, David, Günther, Christoph G, Pichler, Franz

Added by: sketch

Added Date: 2015-12-30

Language: eng

Publishers: Berlin [u.a.] : Springer

Collections: journals contributions, journals

ISBN Number: 3540420703, 9783540420705

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 276.43 MB

PDF Size: 6.54 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Edition: [Elektronische Ressource]

Archive Url

Downloads: 382

Views: 432

Total Files: 18

Media Type: texts

PDF With Zip
Advances in cryptology – EUROCRYPT ..

April 12, 2022

Download PDF

6.54 MB 1PDF Files

Zip Big Size
Advances in cryptology – EUROCRYPT ..

April 12, 2022

Download Zip

276.43 MB 18Files

Total Files: 5

PDF
Advances in cryptology – EUROCRYPT ..
10 1007 3 540 44987 6 pdf

Last Modified: 2015-12-30 05:22:45

Download

Size: 6.54 MB

GZ
Advances in cryptology – EUROCRYPT ..
10 1007 3 540 44987 6 abbyy gz

Last Modified: 2015-12-30 10:39:13

Download

Size: 19.57 MB

TXT
Advances in cryptology – EUROCRYPT ..
10 1007 3 540 44987 6 djvu txt

Last Modified: 2016-01-06 21:09:57

Download

Size: 1.41 MB

ZIP
Advances in cryptology – EUROCRYPT ..
10 1007 3 540 44987 6 jp2 zip

Last Modified: 2015-12-30 05:30:21

Download

Size: 226.46 MB

TORRENT
Advances in cryptology – EUROCRYPT ..
springer 10 1007 3 540 44987 6 archive t...torrent

Last Modified: 2023-05-26 03:11:25

Download

Size: 14.90 KB

Description

Advances in Cryptology — EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings
Author: Birgit Pfitzmann
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42070-5
DOI: 10.1007/3-540-44987-6

Table of Contents:

  • A Memory Efficient Version of Satoh’s Algorithm
  • Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
  • How Secure Are Elliptic Curves over Composite Extension Fields?
  • Efficient and Non-interactive Non-malleable Commitment
  • How to Convert the Flavor of a Quantum Bit Commitment
  • Cryptographic Counters and Applications to Electronic Voting
  • An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
  • Priced Oblivious Transfer: How to Sell Digital Goods
  • A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
  • Practical Threshold RSA Signatures without a Trusted Dealer
  • Hash Functions: From Merkle-Damgård to Shoup
  • Key Recovery and Message Attacks on NTRU-Composite
  • Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
  • NSS: An NTRU Lattice-Based Signature Scheme
  • The Bit Security of Paillier’s Encryption Scheme and Its Applications
  • Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
  • On Adaptive vs. Non-adaptive Security of Multiparty Protocols
  • Multiparty Computation from Threshold Homomorphic Encryption
  • On Perfect and Adaptive Security in Exposure-Resilient Cryptography
  • Cryptanalysis of Reduced-Round MISTY

Literaturangaben

You May Also Like

We will be happy to hear your thoughts

Leave a reply

eBookmela
Logo
Register New Account