LEADER 03671nam 22008055 450 001 996465765403316 005 20230412074134.0 010 $a3-642-21518-1 024 7 $a10.1007/978-3-642-21518-6 035 $a(CKB)2670000000099840 035 $a(SSID)ssj0000530666 035 $a(PQKBManifestationID)11351552 035 $a(PQKBTitleCode)TC0000530666 035 $a(PQKBWorkID)10568462 035 $a(PQKB)10190598 035 $a(DE-He213)978-3-642-21518-6 035 $a(MiAaPQ)EBC3066997 035 $a(PPN)156312549 035 $a(EXLCZ)992670000000099840 100 $a20110718d2011 u| 0 101 0 $aeng 135 $aurnn|008mamaa 181 $ctxt 182 $cc 183 $acr 200 10$aInformation Security and Cryptology$b[electronic resource] $e6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers /$fedited by Xuejia Lai, Moti Yung, Dongdai Lin 205 $a1st ed. 2011. 210 1$aBerlin, Heidelberg :$cSpringer Berlin Heidelberg :$cImprint: Springer,$d2011. 215 $a1 online resource (XIV, 524 p. 91 illus., 31 illus. in color.) 225 1 $aSecurity and Cryptology ;$v6584 300 $aBibliographic Level Mode of Issuance: Monograph 311 $a3-642-21517-3 320 $aIncludes bibliographical references and index. 327 $aNew constructions of public-key encryption schemes from conjugacy search problems / Lihua Wang [and 4 others] -- On the CCA1-security of Elganial and Damgard's Elgamal / Helger Lipmaa -- Online/offline identity0based signcryption revisited / Joseph K. Liu, Joonsang Baek, Jianying Zhou. 330 $aThis book constitutes the thoroughly refereed post-conference proceedings of the 6th International Conference on Information Security and Cryptology, Inscrypt 2010, held in Shanghai, China, in October 2010. The 35 revised full papers presented were carefully reviewed and selected from 125 submissions. The papers are organized in topical sections on encryption schemes, stream ciphers, sequences and elliptic curves, secure computing, hash functions, key management, digital signatures, privacy and algebraic cryptanalysis, hashing and authentication, and hardware and software issues. 410 0$aSecurity and Cryptology ;$v6584 606 $aComputer networks 606 $aCryptography 606 $aData encryption (Computer science) 606 $aElectronic data processing?Management 606 $aAlgorithms 606 $aData protection 606 $aComputers and civilization 606 $aComputer Communication Networks 606 $aCryptology 606 $aIT Operations 606 $aAlgorithms 606 $aData and Information Security 606 $aComputers and Society 615 0$aComputer networks. 615 0$aCryptography. 615 0$aData encryption (Computer science). 615 0$aElectronic data processing?Management. 615 0$aAlgorithms. 615 0$aData protection. 615 0$aComputers and civilization. 615 14$aComputer Communication Networks. 615 24$aCryptology. 615 24$aIT Operations. 615 24$aAlgorithms. 615 24$aData and Information Security. 615 24$aComputers and Society. 676 $a004.6 702 $aLai$b Xuejia$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aYung$b Moti$4edt$4http://id.loc.gov/vocabulary/relators/edt 702 $aLin$b Dongdai$4edt$4http://id.loc.gov/vocabulary/relators/edt 906 $aBOOK 912 $a996465765403316 996 $aInformation Security and Cryptology$9772230 997 $aUNISA