Document - eBookmela
Loading...

Advances in cryptology CRYPTO 2000 : 20th Annual International Cryptology Conference, Santa Barbara, Californi | CRYPTO (Conference) (2000 : Santa Barbara, Calif.), Bellare, Mihir, 1962-

Likes0
Telegram icon Share on Telegram

Advances in cryptology CRYPTO 2000 : 20th Annual International Cryptology Conference, Santa Barbara, Californi

User Rating: Be the first one!

Author: CRYPTO (Conference) (2000 : Santa Barbara, Calif.), Bellare, Mihir, 1962-

Added by: sketch

Added Date: 2015-12-30

Publication Date: 2000

Language: eng

Subjects: Computer security, Cryptography

Publishers: Berlin ; New York : Springer

Collections: journals contributions, journals

ISBN Number: 3540679073

Pages Count: 300

PPI Count: 300

PDF Count: 1

Total Size: 277.05 MB

PDF Size: 5.8 MB

Extensions: djvu, gif, pdf, gz, zip, torrent, log, mrc

Edition: [Elektronische Ressource]

Archive Url

Downloads: 314

Views: 364

Total Files: 18

Media Type: texts

Description

Advances in Cryptology — CRYPTO 2000: 20th Annual International Cryptology Conference Santa Barbara, California, USA, August 20–24, 2000 Proceedings
Author: Mihir Bellare
Published by Springer Berlin Heidelberg
ISBN: 978-3-540-67907-3
DOI: 10.1007/3-540-44598-6

Table of Contents:

  • The XTR Public Key System
  • A Chosen-Ciphertext Attack against NTRU
  • Privacy Preserving Data Mining
  • Reducing the Servers Computation in Private Information Retrieval: PIR with Preprocessing
  • Parallel Reducibility for Information-Theoretically Secure Computation
  • Optimistic Fair Secure Computation
  • A Cryptographic Solution to a Game Theoretic Problem
  • Differential Fault Attacks on Elliptic Curve Cryptosystems
  • Quantum Public-Key Cryptosystems
  • New Public-Key Cryptosystem Using Braid Groups
  • Key Recovery and Forgery Attacks on the MacDES MAC Algorithm
  • CBC MACs for Arbitrary-Length Messages: The Three-Key Constructions
  • L-collision Attacks against Randomized MACs
  • On the Exact Security of Full Domain Hash
  • Timed Commitments
  • A Practical and Provably Secure Coalition-Resistant Group Signature Scheme
  • Provably Secure Partially Blind Signatures
  • Weaknesses in the SL2(
  • Fast Correlation Attacks through Reconstruction of Linear Polynomials
  • Sequential Traitor Tracing

Includes bibliographical references and index
eBookmela
Logo
Register New Account