top

  Info

  • Utilizzare la checkbox di selezione a fianco di ciascun documento per attivare le funzionalità di stampa, invio email, download nei formati disponibili del (i) record.

  Info

  • Utilizzare questo link per rimuovere la selezione effettuata.
Advances in Cryptology - ASIACRYPT 2002 [[electronic resource] ] : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings / / edited by Yuliang Zheng
Advances in Cryptology - ASIACRYPT 2002 [[electronic resource] ] : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings / / edited by Yuliang Zheng
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XIV, 582 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory
Information theory
Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Coding and Information Theory
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-540-36178-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis of Bernstein’s Factorization Circuit -- A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order -- Looking beyond XTR -- Bounds for Robust Metering Schemes and Their Relationship with A2-code -- Unconditionally Secure Anonymous Encryption and Group Authentication -- Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model -- On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives -- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order -- Efficient Oblivious Transfer in the Bounded-Storage Model -- In How Many Ways Can You Write Rijndael? -- On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis -- Threshold Cryptosystems Based on Factoring -- Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments -- Asynchronous Secure Communication Tolerating Mixed Adversaries -- Amplified Boomerang Attack against Reduced-Round SHACAL -- Enhancing Differential-Linear Cryptanalysis -- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations -- Analysis of Neural Cryptography -- The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm -- A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2 -- A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme -- On Unconditionally Secure Robust Distributed Key Distribution Centers -- Short Signatures in the Random Oracle Model -- The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes -- Transitive Signatures Based on Factoring and RSA -- 1-out-of-n Signatures from a Variety of Keys -- A Revocation Scheme with Minimal Storage at Receivers -- Optimistic Mixing for Exit-Polls -- Improved Construction of Nonlinear Resilient S-Boxes -- An Upper Bound on the Number of m-Resilient Boolean Functions -- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks -- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization -- ID-Based Blind Signature and Ring Signature from Pairings -- Hierarchical ID-Based Cryptography -- Crypto-integrity -- Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis.
Record Nr. UNINA-9910143897103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Advances in Cryptology - ASIACRYPT 2002 [[electronic resource] ] : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings / / edited by Yuliang Zheng
Advances in Cryptology - ASIACRYPT 2002 [[electronic resource] ] : 8th International Conference on the Theory and Application of Cryptology and Information Security, Queenstown, New Zealand, December 1-5, 2002, Proceedings / / edited by Yuliang Zheng
Edizione [1st ed. 2002.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Descrizione fisica 1 online resource (XIV, 582 p.)
Disciplina 005.8
Collana Lecture Notes in Computer Science
Soggetto topico Coding theory
Information theory
Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computer science—Mathematics
Coding and Information Theory
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Discrete Mathematics in Computer Science
ISBN 3-540-36178-2
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Analysis of Bernstein’s Factorization Circuit -- A Variant of the Cramer-Shoup Cryptosystem for Groups of Unknown Order -- Looking beyond XTR -- Bounds for Robust Metering Schemes and Their Relationship with A2-code -- Unconditionally Secure Anonymous Encryption and Group Authentication -- Adapting the Weaknesses of the Random Oracle Model to the Generic Group Model -- On the Impossibilities of Basing One-Way Permutations on Central Cryptographic Primitives -- A Statistically-Hiding Integer Commitment Scheme Based on Groups with Hidden Order -- Efficient Oblivious Transfer in the Bounded-Storage Model -- In How Many Ways Can You Write Rijndael? -- On the Security of Rijndael-Like Structures against Differential and Linear Cryptanalysis -- Threshold Cryptosystems Based on Factoring -- Non-interactive Distributed-Verifier Proofs and Proving Relations among Commitments -- Asynchronous Secure Communication Tolerating Mixed Adversaries -- Amplified Boomerang Attack against Reduced-Round SHACAL -- Enhancing Differential-Linear Cryptanalysis -- Cryptanalysis of Block Ciphers with Overdefined Systems of Equations -- Analysis of Neural Cryptography -- The Hardness of Hensel Lifting: The Case of RSA and Discrete Logarithm -- A Comparison and a Combination of SST and AGM Algorithms for Counting Points of Elliptic Curves in Characteristic 2 -- A General Formula of the (t, n)-Threshold Visual Secret Sharing Scheme -- On Unconditionally Secure Robust Distributed Key Distribution Centers -- Short Signatures in the Random Oracle Model -- The Provable Security of Graph-Based One-Time Signatures and Extensions to Algebraic Signature Schemes -- Transitive Signatures Based on Factoring and RSA -- 1-out-of-n Signatures from a Variety of Keys -- A Revocation Scheme with Minimal Storage at Receivers -- Optimistic Mixing for Exit-Polls -- Improved Construction of Nonlinear Resilient S-Boxes -- An Upper Bound on the Number of m-Resilient Boolean Functions -- Group Diffie-Hellman Key Exchange Secure against Dictionary Attacks -- Secure Channels Based on Authenticated Encryption Schemes: A Simple Characterization -- ID-Based Blind Signature and Ring Signature from Pairings -- Hierarchical ID-Based Cryptography -- Crypto-integrity -- Gummy and Conductive Silicone Rubber Fingers Importance of Vulnerability Analysis.
Record Nr. UNISA-996465387203316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2002
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings / / Jennifer Seberry, Yuliang Zheng, eds
Advances in cryptology--AUSCRYPT '92 : Workshop on the Theory and Application of Cryptographic Techniques, Gold Coast, Queensland, Australia, December 13-16, 1992 : proceedings / / Jennifer Seberry, Yuliang Zheng, eds
Pubbl/distr/stampa Springer Berlin Heidelberg
Disciplina 005.8/2
Altri autori (Persone) SeberryJennifer
ZhengYuliang
Soggetto topico Computer security - Congresses
Cryptography - Congresses
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Altri titoli varianti Advances in Cryptology — AUSCRYPT '92
Record Nr. UNISA-996465877203316
Springer Berlin Heidelberg
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings / / edited by Kan Zhang, Yuliang Zheng
Information Security [[electronic resource] ] : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings / / edited by Kan Zhang, Yuliang Zheng
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 442 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-30144-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Management -- Practical Authenticated Key Agreement Using Passwords -- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks -- Storage-Efficient Stateless Group Key Revocation -- Digital Signatures -- Low-Level Ideal Signatures and General Integrity Idealization -- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA -- How to Break and Repair a Universally Composable Signature Functionality -- New Algorithms -- RSA Accumulator Based Broadcast Encryption -- Chameleon Hashing Without Key Exposure -- Radix-r Non-Adjacent Form -- Cryptanalysis -- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor -- Security Analysis of Two Signcryption Schemes -- On The Security of Key Derivation Functions -- Intrusion Detection -- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery -- A Model for the Semantics of Attack Signatures in Misuse Detection Systems -- Detection of Sniffers in an Ethernet Network -- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks -- Securing DBMS: Characterizing and Detecting Query Floods -- Access Control -- An XML-Based Approach to Document Flow Verification -- Model-Checking Access Control Policies -- A Distributed High Assurance Reference Monitor -- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control -- Human Authentication -- Towards Human Interactive Proofs in the Text-Domain -- Image Recognition CAPTCHAs -- Certificate Management -- A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model -- Certificate Recommendations to Improve the Robustness of Web of Trust -- Mobile and Ad Hoc Security -- Universally Composable Secure Mobile Agent Computation -- Re-thinking Security in IP Based Micro-Mobility -- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group -- Web Security -- Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions -- Provable Unlinkability Against Traffic Analysis Already After Steps! -- An Efficient Online Electronic Cash with Unlinkable Exact Payments -- Digital Rights Management -- Modifiable Digital Content Protection in P2P -- Survey on the Technological Aspects of Digital Rights Management -- Detecting Software Theft via Whole Program Path Birthmarks -- Software Security -- Effective Security Requirements Analysis: HAZOP and Use Cases -- The Obfuscation Executive.
Record Nr. UNINA-9910144345103321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Information Security [[electronic resource] ] : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings / / edited by Kan Zhang, Yuliang Zheng
Information Security [[electronic resource] ] : 7th International Conference, ISC 2004, Palo Alto, CA, USA, September 27-29, 2004, Proceedings / / edited by Kan Zhang, Yuliang Zheng
Edizione [1st ed. 2004.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Descrizione fisica 1 online resource (XII, 442 p.)
Disciplina 005.82
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer communication systems
Operating systems (Computers)
Algorithms
Computers and civilization
Management information systems
Computer science
Cryptology
Computer Communication Networks
Operating Systems
Algorithm Analysis and Problem Complexity
Computers and Society
Management of Computing and Information Systems
ISBN 3-540-30144-5
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Key Management -- Practical Authenticated Key Agreement Using Passwords -- Further Analysis of Password Authenticated Key Exchange Protocol Based on RSA for Imbalanced Wireless Networks -- Storage-Efficient Stateless Group Key Revocation -- Digital Signatures -- Low-Level Ideal Signatures and General Integrity Idealization -- Cryptanalysis of a Verifiably Committed Signature Scheme Based on GPS and RSA -- How to Break and Repair a Universally Composable Signature Functionality -- New Algorithms -- RSA Accumulator Based Broadcast Encryption -- Chameleon Hashing Without Key Exposure -- Radix-r Non-Adjacent Form -- Cryptanalysis -- On Related-Key and Collision Attacks: The Case for the IBM 4758 Cryptoprocessor -- Security Analysis of Two Signcryption Schemes -- On The Security of Key Derivation Functions -- Intrusion Detection -- Evaluating the Impact of Intrusion Detection Deficiencies on the Cost-Effectiveness of Attack Recovery -- A Model for the Semantics of Attack Signatures in Misuse Detection Systems -- Detection of Sniffers in an Ethernet Network -- Using Greedy Hamiltonian Call Paths to Detect Stack Smashing Attacks -- Securing DBMS: Characterizing and Detecting Query Floods -- Access Control -- An XML-Based Approach to Document Flow Verification -- Model-Checking Access Control Policies -- A Distributed High Assurance Reference Monitor -- Using Mediated Identity-Based Cryptography to Support Role-Based Access Control -- Human Authentication -- Towards Human Interactive Proofs in the Text-Domain -- Image Recognition CAPTCHAs -- Certificate Management -- A Hierarchical Key-Insulated Signature Scheme in the CA Trust Model -- Certificate Recommendations to Improve the Robustness of Web of Trust -- Mobile and Ad Hoc Security -- Universally Composable Secure Mobile Agent Computation -- Re-thinking Security in IP Based Micro-Mobility -- Shared-Key Signature and Its Application to Anonymous Authentication in Ad Hoc Group -- Web Security -- Prevent Online Identity Theft – Using Network Smart Cards for Secure Online Transactions -- Provable Unlinkability Against Traffic Analysis Already After Steps! -- An Efficient Online Electronic Cash with Unlinkable Exact Payments -- Digital Rights Management -- Modifiable Digital Content Protection in P2P -- Survey on the Technological Aspects of Digital Rights Management -- Detecting Software Theft via Whole Program Path Birthmarks -- Software Security -- Effective Security Requirements Analysis: HAZOP and Use Cases -- The Obfuscation Executive.
Record Nr. UNISA-996465637603316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2004
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public Key Cryptography [[electronic resource] ] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Public Key Cryptography [[electronic resource] ] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XIV, 490 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer programming
Operating systems (Computers)
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Programming Techniques
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-46588-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol -- An Efficient NICE-Schnorr-Type Signature Scheme -- Identification of Bad Signatures in Batches -- Some Remarks on a Fair Exchange Protocol -- Gaudry’s Variant against C ab Curves -- An Identification Scheme Based on Sparse Polynomials -- A State-Based Model for Certificate Management Systems -- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence -- The Composite Discrete Logarithm and Secure Authentication -- Chosen-Ciphertext Security for Any One-Way Cryptosystem -- Short Proofs of Knowledge for Factoring -- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms -- All-or-Nothing Transform and Remotely Keyed Encryption Protocols -- Security of Public Key Certificate Based Authentication Protocols -- Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2 -- Key Recovery in Third Generation Wireless Communication Systems -- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications -- Certificates of Recoverability with Scalable Recovery Agent Security -- Design Validations for Discrete Logarithm Based Signature Schemes -- Optimally Efficient Accountable Time-Stamping -- “Pseudorandom Intermixing”: A Tool for Shared Cryptography -- RSA-Based Auto-recoverable Cryptosystems -- Efficient and Fresh Certification -- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions -- Cryptographic Approaches to Privacy in Forensic DNA Databases -- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes -- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ) -- An Auction Protocol Which Hides Bids of Losers -- Forward Secrecy and Its Application to Future Mobile Communications Security -- Selecting Cryptographic Key Sizes -- A Structured ElGamal-Type Multisignature Scheme.
Record Nr. UNINA-9910143640503321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Cryptography [[electronic resource] ] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Public Key Cryptography [[electronic resource] ] : Third International Workshop on Practice and Theory in Public Key Cryptosystems, PKC 2000, Melbourne, Victoria, Australia, January 18-20, 2000, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Edizione [1st ed. 2000.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Descrizione fisica 1 online resource (XIV, 490 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computer programming
Operating systems (Computers)
Algorithms
Computer communication systems
Management information systems
Computer science
Cryptology
Programming Techniques
Operating Systems
Algorithm Analysis and Problem Complexity
Computer Communication Networks
Management of Computing and Information Systems
ISBN 3-540-46588-X
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto A Practical and Secure Fault-Tolerant Conference-Key Agreement Protocol -- An Efficient NICE-Schnorr-Type Signature Scheme -- Identification of Bad Signatures in Batches -- Some Remarks on a Fair Exchange Protocol -- Gaudry’s Variant against C ab Curves -- An Identification Scheme Based on Sparse Polynomials -- A State-Based Model for Certificate Management Systems -- Confidence Valuation in a Public-Key Infrastructure Based on Uncertain Evidence -- The Composite Discrete Logarithm and Secure Authentication -- Chosen-Ciphertext Security for Any One-Way Cryptosystem -- Short Proofs of Knowledge for Factoring -- Secure and Practical Tree-Structure Signature Schemes Based on Discrete Logarithms -- All-or-Nothing Transform and Remotely Keyed Encryption Protocols -- Security of Public Key Certificate Based Authentication Protocols -- Efficient Implementation of Schoof’s Algorithm in Case of Characteristic 2 -- Key Recovery in Third Generation Wireless Communication Systems -- Elliptic Curves with the Montgomery-Form and Their Cryptographic Applications -- Certificates of Recoverability with Scalable Recovery Agent Security -- Design Validations for Discrete Logarithm Based Signature Schemes -- Optimally Efficient Accountable Time-Stamping -- “Pseudorandom Intermixing”: A Tool for Shared Cryptography -- RSA-Based Auto-recoverable Cryptosystems -- Efficient and Fresh Certification -- Efficient Zero-Knowledge Proofs of Knowledge without Intractability Assumptions -- Cryptographic Approaches to Privacy in Forensic DNA Databases -- Making Hash Functions from Block Ciphers Secure and Efficient by Using Convolutional Codes -- Fast Implementation of Elliptic Curve Arithmetic in GF(p n ) -- An Auction Protocol Which Hides Bids of Losers -- Forward Secrecy and Its Application to Future Mobile Communications Security -- Selecting Cryptographic Key Sizes -- A Structured ElGamal-Type Multisignature Scheme.
Record Nr. UNISA-996465604803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 2000
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui
Public Key Cryptography [[electronic resource] ] : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Public Key Cryptography [[electronic resource] ] : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (XIII, 271 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computers
Algorithms
Computer communication systems
Cryptology
Theory of Computation
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-69105-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed public key cryptosystems -- How (not) to design RSA signature schemes -- Overview of elliptic curve cryptography -- Lattices and cryptography: An overview -- A signcryption scheme with signature directly verifiable by public key -- Guaranteed correct sharing of integer factorization with off-line shareholders -- Lower bounds on term-based divisible cash systems -- Certifying trust -- On the security of server-aided RSA protocols -- On the security of ElGamal based encryption -- An authenticated Diffie-Hellman key agreement protocol secure against active attacks -- On the security of Girault's identification scheme -- A scheme for obtaining a message from the digital multisignature -- Secure hyperelliptic cryptosystems and their performance -- A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer -- Two efficient algorithms for arithmetic of elliptic curves using Frobenius map -- Public-key cryptosystems using the modular group -- A cellular automaton based fast one-way hash function suitable for hardware implementation -- A new hash function based on MDx-family and its application to MAC -- Security issues for contactless smart cards -- Parameters for secure elliptic curve cryptosystem -improvements on Schoof s algorithm -- A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme.
Record Nr. UNINA-9910143503703321
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. Federico II
Opac: Controlla la disponibilità qui
Public Key Cryptography [[electronic resource] ] : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Public Key Cryptography [[electronic resource] ] : First International Workshop on Practice and Theory in Public Key Cryptography, PKC'98, Pacifico Yokohama, Japan, February 5-6, 1998, Proceedings / / edited by Hideki Imai, Yuliang Zheng
Edizione [1st ed. 1998.]
Pubbl/distr/stampa Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Descrizione fisica 1 online resource (XIII, 271 p.)
Disciplina 005.8/2
Collana Lecture Notes in Computer Science
Soggetto topico Data encryption (Computer science)
Computers
Algorithms
Computer communication systems
Cryptology
Theory of Computation
Algorithm Analysis and Problem Complexity
Computer Communication Networks
ISBN 3-540-69105-7
Formato Materiale a stampa
Livello bibliografico Monografia
Lingua di pubblicazione eng
Nota di contenuto Distributed public key cryptosystems -- How (not) to design RSA signature schemes -- Overview of elliptic curve cryptography -- Lattices and cryptography: An overview -- A signcryption scheme with signature directly verifiable by public key -- Guaranteed correct sharing of integer factorization with off-line shareholders -- Lower bounds on term-based divisible cash systems -- Certifying trust -- On the security of server-aided RSA protocols -- On the security of ElGamal based encryption -- An authenticated Diffie-Hellman key agreement protocol secure against active attacks -- On the security of Girault's identification scheme -- A scheme for obtaining a message from the digital multisignature -- Secure hyperelliptic cryptosystems and their performance -- A practical implementation of elliptic curve cryptosystems over GF(p) on a 16-bit microcomputer -- Two efficient algorithms for arithmetic of elliptic curves using Frobenius map -- Public-key cryptosystems using the modular group -- A cellular automaton based fast one-way hash function suitable for hardware implementation -- A new hash function based on MDx-family and its application to MAC -- Security issues for contactless smart cards -- Parameters for secure elliptic curve cryptosystem -improvements on Schoof s algorithm -- A note on the complexity of breaking Okamoto-Tanaka ID-based key exchange scheme.
Record Nr. UNISA-996466112803316
Berlin, Heidelberg : , : Springer Berlin Heidelberg : , : Imprint : Springer, , 1998
Materiale a stampa
Lo trovi qui: Univ. di Salerno
Opac: Controlla la disponibilità qui