000 | 04011nam a22005295i 4500 | ||
---|---|---|---|
003 | DE-He213 | ||
005 | 20191013144954.0 | ||
007 | cr nn 008mamaa | ||
008 | 100301s2008 gw | s |||| 0|eng d | ||
020 | 6 | 4 |
_a9783540784401 _9978-3-540-78440-1 |
024 | 8 | 7 |
_a10.1007/978-3-540-78440-1 _2doi |
050 | 8 | 4 | _a Libro electrónico |
072 | 8 | 7 |
_aURY _2bicssc |
072 | 8 | 7 |
_aCOM053000 _2bisacsh |
082 |
_a005.82 _223 |
||
100 | 8 | 1 |
_aCramer, Ronald. _eeditor. _9139770 |
245 | 9 | 7 |
_aPublic Key Cryptography PKC 2008 _h[electronic resource] : _b11th International Workshop on Practice and Theory in Public-Key Cryptography, Barcelona, Spain, March 9-12, 2008. Proceedings / _cedited by Ronald Cramer. |
001 | 000064891 | ||
300 | 6 | 4 |
_aXIII, 402 p. _bonline resource. |
490 | 8 | 1 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4939 |
505 | 8 | 0 | _aSession I: Algebraic and Number Theoretical Cryptanalysis (I) -- Total Break of the ?-IC Signature Scheme -- Recovering NTRU Secret Key from Inversion Oracles -- Solving Systems of Modular Equations in One Variable: How Many RSA-Encrypted Messages Does Eve Need to Know? -- Session II: Theory of Public Key Encryption -- Relations Among Notions of Plaintext Awareness -- Completely Non-malleable Encryption Revisited -- Invited Talk I -- Cryptographic Test Correction -- Session III: Digital Signatures (I) -- Off-Line/On-Line Signatures: Theoretical Aspects and Experimental Results -- Construction of Universal Designated-Verifier Signatures and Identity-Based Signatures from Standard Signatures -- Proxy Signatures Secure Against Proxy Key Exposure -- Session IV: Identification, Broadcast and Key Agreement -- Lattice-Based Identification Schemes Secure Under Active Attacks -- Efficient Simultaneous Broadcast -- SAS-Based Group Authentication and Key Agreement Protocols -- Session V: Implementation of Fast Arithmetic -- An Optimized Hardware Architecture for the Montgomery Multiplication Algorithm -- New Composite Operations and Precomputation Scheme for Elliptic Curve Cryptosystems over Prime Fields -- Session VI: Digital Signatures (II) -- Online-Untransferable Signatures -- Security of Digital Signature Schemes in Weakened Random Oracle Models -- A Digital Signature Scheme Based on CVP ??? -- Session VII: Algebraic and Number Theoretical Cryptanalysis (II) -- An Analysis of the Vector Decomposition Problem -- A Parameterized Splitting System and Its Application to the Discrete Logarithm Problem with Low Hamming Weight Product Exponents -- Session VIII: Public Key Encryption -- Certificateless Encryption Schemes Strongly Secure in the Standard Model -- Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption -- Public Key Broadcast Encryption with Low Number of Keys and Constant Decryption Time. |
650 | 8 | 0 |
_aComputer science. _9139771 |
650 | 8 | 0 |
_aComputer Communication Networks. _9139772 |
650 | 8 | 0 |
_aData encryption (Computer science). _9139773 |
650 | 8 | 0 |
_aComputer software. _910118 |
650 | 8 | 0 |
_aInformation Systems. _9139774 |
650 |
_aComputer Science. _9139775 |
||
650 |
_aData Encryption. _9139776 |
||
650 |
_aAlgorithm Analysis and Problem Complexity. _910120 |
||
650 |
_aComputer Communication Networks. _9139772 |
||
650 |
_aComputers and Society. _9139777 |
||
650 |
_aManagement of Computing and Information Systems. _99204 |
||
710 | 8 | 2 |
_aSpringerLink (Online service) _9139778 |
773 | 8 | 0 | _tSpringer eBooks |
776 |
_iPrinted edition: _z9783540784395 |
||
830 | 8 | 0 |
_aLecture Notes in Computer Science, _x0302-9743 ; _v4939 _9139779 |
856 |
_uhttp://dx.doi.org/10.1007/978-3-540-78440-1 _zde clik aquí para ver el libro electrónico |
||
264 | 8 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg, _c2008. |
336 | 6 | 4 |
_atext _btxt _2rdacontent |
337 | 6 | 4 |
_acomputer _bc _2rdamedia |
338 | 6 | 4 |
_aonline resource _bcr _2rdacarrier |
347 | 6 | 4 |
_atext file _bPDF _2rda |
516 | 6 | 4 | _aZDB-2-SCS |
516 | 6 | 4 | _aZDB-2-LNC |
999 |
_c64621 _d64621 |
||
942 | _c05 |