LEADER 05887nam 22007575 450 001 9910767583803321 005 20200629210230.0 010 $a3-540-68462-X 024 7 $a10.1007/BFb0055715 035 $a(CKB)1000000000210964 035 $a(SSID)ssj0000320926 035 $a(PQKBManifestationID)11262178 035 $a(PQKBTitleCode)TC0000320926 035 $a(PQKBWorkID)10258159 035 $a(PQKB)10195001 035 $a(DE-He213)978-3-540-68462-6 035 $a(PPN)155166190 035 $a(EXLCZ)991000000000210964 100 $a20121227d1998 u| 0 101 0 $aeng 135 $aurnn#008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aAdvances in Cryptology - CRYPTO '98$b[electronic resource] $e18th Annual International Cryptology Conference, Santa Barbara, California, USA, August 23-27, 1998, Proceedings /$fedited by Hugo Krawczyk 205 $a1st ed. 1998. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d1998. 215 $a1 online resource (XII, 524 p.) 225 1 $aLecture Notes in Computer Science,$x0302-9743 ;$v1462 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-540-64892-5 327 $aChosen ciphertext attacks against protocols based on the RSA encryption standard PKCS #1 -- A practical public key cryptosystem provably secure against adaptive chosen ciphertext attack -- Relations among notions of security for public-key encryption schemes -- Cryptography and the internet -- Differential collisions in SHA-0 -- From differential cryptanalysis to ciphertext-only attacks -- A simplified approach to threshold and proactive RSA -- New efficient and secure protocols for verifiable signature sharing and other applications -- Trading correctness for privacy in unconditional multi-party computation -- Fast digital identity revocation -- Self-delegation with controlled propagation ? or ? What if you lose your laptop -- Identity escrow -- Generalized birthday attacks on unbalanced Feistel networks -- Quadratic relation of S-box and its application to the linear attack of full round DES -- Cryptanalysis of block ciphers with probabilistic non-linear relations of low degree -- Cryptanalysis of the Ajtai-Dwork cryptosystem -- Cryptanalysis of the Chor-Rivest cryptosystem -- Cryptanalysis of the oil and vinegar signature scheme -- From unpredictability to indistinguishability: A simple construction of pseudo-random functions from MACs -- Many-to-one trapdoor functions and their relation to public-key cryptosystems -- Authentication, enhanced security and error correcting codes -- An efficient discrete log pseudo random generator -- Fast RSA-type cryptosystem modulo p k q -- An elliptic curve implementation of the finite field digital signature algorithm -- Quantum bit commitment from a physical assumption -- On concrete security treatment of signatures derived from identification -- Building PRFs from PRPs -- Security amplification by composition: The case of doubly-iterated, ideal ciphers -- On the existence of 3-round zero-knowledge protocols -- Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free? -- Concurrent zero-knowledge: Reducing the need for timing constraints -- The solution of McCurley's discrete log challenge -- Optimal extension fields for fast arithmetic in public-key algorithms -- Time-stamping with binary linking schemes -- Threshold traitor tracing. 330 $aThis book constitutes the refereed proceedings of the 18th Annual International Cryptology Conference, CRYPTO'98, held in Santa Barbara, California, USA, in August 1998. The book presents 33 revised full papers selected from a total of 144 submissions received. Also included are two invited presentations. The papers are organized in topical sections on chosen ciphertext security, cryptanalysis of hash functions and block ciphers, distributed cryptography, zero knowledge, and implementation. 410 0$aLecture Notes in Computer Science,$x0302-9743 ;$v1462 606 $aData encryption (Computer science) 606 $aComputer security 606 $aComputers 606 $aComputer science?Mathematics 606 $aComputer communication systems 606 $aManagement information systems 606 $aComputer science 606 $aCryptology$3https://scigraph.springernature.com/ontologies/product-market-codes/I28020 606 $aSystems and Data Security$3https://scigraph.springernature.com/ontologies/product-market-codes/I28060 606 $aTheory of Computation$3https://scigraph.springernature.com/ontologies/product-market-codes/I16005 606 $aDiscrete Mathematics in Computer Science$3https://scigraph.springernature.com/ontologies/product-market-codes/I17028 606 $aComputer Communication Networks$3https://scigraph.springernature.com/ontologies/product-market-codes/I13022 606 $aManagement of Computing and Information Systems$3https://scigraph.springernature.com/ontologies/product-market-codes/I24067 615 0$aData encryption (Computer science). 615 0$aComputer security. 615 0$aComputers. 615 0$aComputer science?Mathematics. 615 0$aComputer communication systems. 615 0$aManagement information systems. 615 0$aComputer science. 615 14$aCryptology. 615 24$aSystems and Data Security. 615 24$aTheory of Computation. 615 24$aDiscrete Mathematics in Computer Science. 615 24$aComputer Communication Networks. 615 24$aManagement of Computing and Information Systems. 676 $a005.82 702 $aKrawczyk$b Hugo$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a9910767583803321 996 $aAdvances in Cryptology - CRYPTO '98$91944999 997 $aUNINA