Advances in Cryptology — ASIACRYPT’98 (Record no. 188718)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 06389nam a22006495i 4500 |
001 - CONTROL NUMBER | |
control field | 978-3-540-49649-6 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240423132526.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 121227s1998 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9783540496496 |
-- | 978-3-540-49649-6 |
024 7# - OTHER STANDARD IDENTIFIER | |
Standard number or code | 10.1007/3-540-49649-1 |
Source of number or code | doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA268 |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | bicssc |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | COM083000 |
Source | bisacsh |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | GPJ |
Source | thema |
072 #7 - SUBJECT CATEGORY CODE | |
Subject category code | URY |
Source | thema |
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
Classification number | 005.824 |
Edition number | 23 |
245 10 - TITLE STATEMENT | |
Title | Advances in Cryptology — ASIACRYPT’98 |
Medium | [electronic resource] : |
Remainder of title | International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, October 18–22, 1998, Proceedings / |
Statement of responsibility, etc | edited by Kazuo Ohta, Dingyi Pei. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. 1998. |
264 #1 - | |
-- | Berlin, Heidelberg : |
-- | Springer Berlin Heidelberg : |
-- | Imprint: Springer, |
-- | 1998. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | XII, 436 p. 2 illus. |
Other physical details | online resource. |
336 ## - | |
-- | text |
-- | txt |
-- | rdacontent |
337 ## - | |
-- | computer |
-- | c |
-- | rdamedia |
338 ## - | |
-- | online resource |
-- | cr |
-- | rdacarrier |
347 ## - | |
-- | text file |
-- | |
-- | rda |
490 1# - SERIES STATEMENT | |
Series statement | Lecture Notes in Computer Science, |
International Standard Serial Number | 1611-3349 ; |
Volume number/sequential designation | 1514 |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Public Key Cryptosystems -- Generating RSA Moduli with a Predetermined Portion -- Generation of Shared RSA Keys by Two Parties -- An Attack on RSA Given a Small Fraction of the Private Key Bits -- C ?+ * and HM: Variations Around Two Schemes of T. Matsumoto and H. Imai -- Invited Talk -- ECC/DLP and Factoring-Based Cryptography: A Tale of Two Families (Invited Lecture) -- Elliptic Curve Cryptosystems -- Efficient Elliptic Curve Exponentiation Using Mixed Coordinates -- Efficient Implementation of Schoof’s Algorithm -- Design of Hyperelliptic Cryptosystems in Small Characteristic and a Software Implementation over F2 n -- Construction of Secure Elliptic Cryptosystems Using CM Tests and Liftings -- Elliptic Curve Discrete Logarithms and the Index Calculus -- Cryptanalysis 1 -- Cryptanalysis of Rijmen-Preneel Trapdoor Ciphers -- Improved Truncated Differential Attacks on SAFER -- Optimal Resistance Against the Davies and Murphy Attack -- Signature -- A Group Signature Scheme with Improved Efficiency (Extended Abstract) -- A Study on the Proposed Korean Digital Signature Algorithm -- Cryptanlysis 2 -- Cryptanalysis of the Original McEliece Cryptosystem -- Improving the Security of the McEliece Public-Key Cryptosystem -- Cryptanalysis in Prime Order Subgroups of Z n * -- Finite Automata -- Weak Invertibility of Finite Automata and Cryptanalysis on FAPKC -- Authentication Codes -- Bounds and Constructions for Multireceiver Authentication Codes -- Electronic Cash -- Fair Off-Line e-Cash Made Easy -- Off-line Fair Payment Protocols using Convertible Signatures -- Efficient Fair Exchange with Verifiable Confirmation of Signatures -- Adaptively Secure Oblivious Transfer -- Steam Ciphers -- ML-Sequences over Rings Z/(2e): I. Constructions of Nondegenerative ML-Sequences II. Injectivness of CompressionMappings of New Classes -- Analysis Methods for (Alleged) RC4 -- Reduced Complexity Correlation Attacks on Two Clock-Controlled Generators -- Cryptographic Protocols -- A New and Efficient All-Or-Nothing Disclosure of Secrets Protocol -- The Béguin-Quisquater Server-Aided RSA Protocol from Crypto ’95 is not Secure -- Key Escrow -- Equitable Key Escrow with Limited Time Span (or, How to Enforce Time Expiration Cryptographically) Extended Abstract -- New Cryptography -- Audio and Optical Cryptography -- Information Theory -- Strong Security Against Active Attacks in Information-Theoretic Secret-Key Agreement -- Some Bounds and a Construction for Secure Broadcast Encryption. |
520 ## - SUMMARY, ETC. | |
Summary, etc | ASIACRYPT’98, the international conference covering all aspects of theory and application of cryptology and information security, is being held at Beijing Friendship Hotel from October 18 to 22. This is the fourth of the Asiacrypt conferences. ASIACRYPT’98 is sponsored by the State Key Laboratory of Information Security (SKLOIS), University of Science and Technology of China (USTC), and the Asiacrypt Steering Committee (ASC), in cooperation with the International Association for Cryptology Research (IACR). The 16-member Program Committee organized the scientific program and considered 118 submissions. Of these, 32 were accepted for presentation. The authors’ affiliations of the 118 submissions and the 32 accepted papers range over 18 and 13 countries or regions, respectively. The submitted version of each paper was sent to all members of the Program Committee and was extensively examined by at least three committee members and/or outside experts. The review process was rigorously blinded and the anonymity of each submission are maintained until the selection was completed. We followed the traditional policy that each member of the Program Committee could be an author of at most one accepted paper. These proceedings contain the revised versions of the 32 contributed talks as well as a short note written by one invited speaker. Comments from the Program Committee were taken into account in the revisions. However, the authors (not the committee) bear full responsibility for the contents of their papers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptography. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Data encryption (Computer science). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating systems (Computers). |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Electronic data processing |
General subdivision | Management. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Business information services. |
650 14 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Cryptology. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Operating Systems. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | IT Operations. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | Algorithms. |
650 24 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name as entry element | IT in Business. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Ohta, Kazuo. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Pei, Dingyi. |
Relator term | editor. |
Relator code | edt |
-- | http://id.loc.gov/vocabulary/relators/edt |
710 2# - ADDED ENTRY--CORPORATE NAME | |
Corporate name or jurisdiction name as entry element | SpringerLink (Online service) |
773 0# - HOST ITEM ENTRY | |
Title | Springer Nature eBook |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783540651093 |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Display text | Printed edition: |
International Standard Book Number | 9783662201732 |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Lecture Notes in Computer Science, |
-- | 1611-3349 ; |
Volume number/sequential designation | 1514 |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://doi.org/10.1007/3-540-49649-1">https://doi.org/10.1007/3-540-49649-1</a> |
912 ## - | |
-- | ZDB-2-SCS |
912 ## - | |
-- | ZDB-2-SXCS |
912 ## - | |
-- | ZDB-2-LNC |
912 ## - | |
-- | ZDB-2-BAE |
942 ## - ADDED ENTRY ELEMENTS (KOHA) | |
Koha item type | eBooks-CSE-Springer |
No items available.