Advances in cryptology EUROCRYPT ..
User Rating: Be the first one!
Author: EUROCRYPT, Chaum, David, Günther, Christoph G, Pichler, Franz
Added by: sketch
Added Date: 2015-12-30
Language: eng
Publishers: Berlin [u.a.] : Springer
Collections: journals contributions, journals
ISBN Number: 3540420703, 9783540420705
Pages Count: 300
PPI Count: 300
PDF Count: 1
Total Size: 276.43 MB
PDF Size: 6.54 MB
Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc
Edition: [Elektronische Ressource]
Downloads: 382
Views: 432
Total Files: 18
Media Type: texts
Total Files: 5
TORRENT
springer 10 1007 3 540 44987 6 archive t...torrent
Last Modified: 2023-05-26 03:11:25
Download
Size: 14.90 KB
Description
Advances in Cryptology — EUROCRYPT 2001: International Conference on the Theory and Application of Cryptographic Techniques Innsbruck, Austria, May 6–10, 2001 Proceedings
Author: Birgit Pfitzmann
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42070-5
DOI: 10.1007/3-540-44987-6
Table of Contents:
Literaturangaben
Author: Birgit Pfitzmann
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-42070-5
DOI: 10.1007/3-540-44987-6
Table of Contents:
- A Memory Efficient Version of Satoh’s Algorithm
- Finding Secure Curves with the Satoh-FGH Algorithm and an Early-Abort Strategy
- How Secure Are Elliptic Curves over Composite Extension Fields?
- Efficient and Non-interactive Non-malleable Commitment
- How to Convert the Flavor of a Quantum Bit Commitment
- Cryptographic Counters and Applications to Electronic Voting
- An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
- Priced Oblivious Transfer: How to Sell Digital Goods
- A Secure Three-Move Blind Signature Scheme for Polynomially Many Signatures
- Practical Threshold RSA Signatures without a Trusted Dealer
- Hash Functions: From Merkle-Damgård to Shoup
- Key Recovery and Message Attacks on NTRU-Composite
- Evidence that XTR Is More Secure than Supersingular Elliptic Curve Cryptosystems
- NSS: An NTRU Lattice-Based Signature Scheme
- The Bit Security of Paillier’s Encryption Scheme and Its Applications
- Assumptions Related to Discrete Logarithms: Why Subtleties Make a Real Difference
- On Adaptive vs. Non-adaptive Security of Multiparty Protocols
- Multiparty Computation from Threshold Homomorphic Encryption
- On Perfect and Adaptive Security in Exposure-Resilient Cryptography
- Cryptanalysis of Reduced-Round MISTY
Literaturangaben
You May Also Like
We will be happy to hear your thoughts