LEADER 01833nam 2200565 450 001 9910568246603321 005 20231201150000.0 010 $a3-030-96436-1 035 $a(MiAaPQ)EBC6977310 035 $a(Au-PeEL)EBL6977310 035 $a(CKB)22046317700041 035 $a(PPN)269155228 035 $a(EXLCZ)9922046317700041 100 $a20221129d2022 uy 0 101 0 $aeng 135 $aurcnu|||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 12$aA topology of mind $espiral thought patterns, the hyperlinking of text, ideas and more /$fRobert K. Logan and Izabella Pruska-Oldenhof 210 1$aCham, Switzerland :$cSpringer,$d[2022] 210 4$d©2022 215 $a1 online resource (255 pages) 225 0 $aMathematics in mind 311 08$aPrint version: Logan, Robert K. A Topology of Mind Cham : Springer International Publishing AG,c2022 9783030964351 320 $aIncludes bibliographical references (pages 239-245). 410 0$aMathematics in Mind 606 $aMathematics$xPhilosophy 606 $aPsycholinguistics 606 $aThought and thinking 606 $aFilosofia de la matemàtica$2thub 606 $aPensament$2thub 606 $aPsicolingüística$2thub 608 $aLlibres electrònics$2thub 615 0$aMathematics$xPhilosophy. 615 0$aPsycholinguistics. 615 0$aThought and thinking. 615 7$aFilosofia de la matemàtica 615 7$aPensament 615 7$aPsicolingüística 676 $a510.1 700 $aLogan$b Robert K.$f1939-$01099826 702 $aPruska-Oldenhof$b Izabella 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910568246603321 996 $aA topology of mind$92985311 997 $aUNINA LEADER 07868nam 22008415 450 001 9910144332803321 005 20251116234636.0 010 $a3-540-30539-4 024 7 $a10.1007/b104116 035 $a(CKB)1000000000212651 035 $a(DE-He213)978-3-540-30539-2 035 $a(SSID)ssj0000098383 035 $a(PQKBManifestationID)11120041 035 $a(PQKBTitleCode)TC0000098383 035 $a(PQKBWorkID)10133783 035 $a(PQKB)11127778 035 $a(MiAaPQ)EBC3088242 035 $a(PPN)155215876 035 $a(EXLCZ)991000000000212651 100 $a20121227d2004 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aAdvances in Cryptology - ASIACRYPT 2004 $e10th International Conference on the Theory and Application of Cryptology and Information Security, Jeju Island, Korea, December 5-9, 2004, Proceedings /$fedited by Pil Joong Lee 205 $a1st ed. 2004. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2004. 215 $a1 online resource (XVI, 548 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v3329 300 $aIncludes index. 311 08$a3-540-23975-8 327 $aBlock Ciphers -- On Feistel Ciphers Using Optimal Diffusion Mappings Across Multiple Rounds -- Efficient Instantiations of Tweakable Blockciphers and Refinements to Modes OCB and PMAC -- Eliminating Random Permutation Oracles in the Even-Mansour Cipher -- Public Key Encryption -- Towards Plaintext-Aware Public-Key Encryption Without Random Oracles -- OAEP 3-Round:A Generic and Secure Asymmetric Encryption Padding -- Invited Talk I -- Stream Ciphers: Dead or Alive? -- Number Theory and Algebra -- On the Generalized Linear Equivalence of Functions Over Finite Fields -- Sieving Using Bucket Sort -- Right-Invariance: A Property for Probabilistic Analysis of Cryptography Based on Infinite Groups -- Secure Computation -- Practical Two-Party Computation Based on the Conditional Gate -- Privacy in Non-private Environments -- Asynchronous Proactive Cryptosystems Without Agreement -- Lattice-Based Threshold-Changeability for Standard Shamir Secret-Sharing Schemes -- Hash Functions -- Masking Based Domain Extenders for UOWHFs: Bounds and Constructions -- Higher Order Universal One-Way Hash Functions -- The MD2 Hash Function Is Not One-Way -- Key Management -- New Approaches to Password Authenticated Key Exchange Based on RSA -- Constant-Round Authenticated Group Key Exchange for Dynamic Groups -- A Public-Key Black-Box Traitor Tracing Scheme with Sublinear Ciphertext Size Against Self-Defensive Pirates -- Identification -- Batching Schnorr Identification Scheme with Applications to Privacy-Preserving Authorization and Low-Bandwidth Communication Devices -- Secret Handshakes from CA-Oblivious Encryption -- k-Times Anonymous Authentication (Extended Abstract) -- XL-Algorithms -- The XL-Algorithm and a Conjecture from Commutative Algebra -- Comparison Between XL and Gröbner Basis Algorithms -- Digital Signatures -- Generic Homomorphic Undeniable Signatures -- Efficient and Provably Secure Trapdoor-Free Group Signature Schemes from Bilinear Pairings -- Public Key Cryptanalysis -- On the Security of MOR Public Key Cryptosystem -- Cryptanalyzing the Polynomial-Reconstruction Based Public-Key System Under Optimal Parameter Choice -- Colluding Attacks to a Payment Protocol and Two Signature Exchange Schemes -- Invited Talk II -- Information Security in Korea IT839 Strategy -- Symmetric Key Cryptanalysis -- How Far Can We Go Beyond Linear Cryptanalysis? -- The Davies-Murphy Power Attack -- Time-Memory Trade-Off Attacks on Multiplications and T-Functions -- Cryptanalysis of Bluetooth Keystream Generator Two-Level E0 -- Protocols -- On Provably Secure Time-Stamping Schemes -- Strong Conditional Oblivious Transfer and Computing on Intervals -- Improved Setup Assumptions for 3-Round Resettable Zero Knowledge. 330 $aThe 10th Annual ASIACRYPT 2004 was held in Jeju Island, Korea, d- ing December 5?9, 2004. This conference was organized by the International Association for Cryptologic Research (IACR) in cooperation with KIISC (- rean Institute of Information Security and Cryptology) and IRIS (International Research center for Information Security) at ICU (Information and Communi- tionsUniversity),andwas?nanciallysupportedbyMIC(MinistryofInformation and Communication) in Korea. The conference received, from 30 countries, 208 submissions that represent the current state of work in the cryptographic community worldwide, covering all areas of cryptologic research. Each paper, without the authors? information, was reviewed by at least three members of the program committee, and the papers (co-)authored by members of the program committee were reviewed by at least six members. We also blinded the reviewers? names among the reviewers until the ?nal decision, by using pseudonyms. The reviews were then followed by deep discussions on the papers, which greatly contributed to the quality of the ?nal selection. In most cases, extensive comments were sent to the authors. Among 208 submissions, the program committee selected 36 papers. Two submissions were merged into a single paper, yielding the total of 35 papers acceptedforpresentationinthetechnicalprogramoftheconference.Manyhi- quality works could not be accepted because of the competitive nature of the conference and the challenging task of selecting a program. These proceedings contain revised versions of the accepted papers. These revisions have not been checked for correctness, and the authors bear full responsibility for the contents of their papers. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v3329 606 $aCoding theory 606 $aInformation theory 606 $aData encryption (Computer science) 606 $aOperating systems (Computers) 606 $aAlgorithms 606 $aManagement information systems 606 $aComputer science 606 $aComputer networks 606 $aCoding and Information Theory$3https://scigraph.springernature.com/ontologies/product-market-codes/I15041 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aOperating Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I14045 606 $aAlgorithm Analysis and Problem Complexity$3https://scigraph.springernature.com/ontologies/product-market-codes/I16021 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 615 0$aCoding theory. 615 0$aInformation theory. 615 0$aData encryption (Computer science) 615 0$aOperating systems (Computers) 615 0$aAlgorithms. 615 0$aManagement information systems. 615 0$aComputer science. 615 0$aComputer networks. 615 14$aCoding and Information Theory. 615 24$aCryptology. 615 24$aOperating Systems. 615 24$aAlgorithm Analysis and Problem Complexity. 615 24$aManagement of Computing and Information Systems. 615 24$aComputer Communication Networks. 676 $a005.8/2 702 $aLee$b Pil Joong$4edt$4http://id.loc.gov/vocabulary/relators/edt 712 12$aInternational Conference on the Theory and Application of Cryptology and Information Security 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910144332803321 996 $aAdvances in Cryptology - ASIACRYPT 2004$92204567 997 $aUNINA