The Resource Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini
Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini
Resource Information
The item Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 1 library branch.
 Summary
 This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms
 Language
 eng
 Extent
 1 online resource
 Contents

 Multifeature security through homomorphic encryption
 Multiplicative nonabelian sharing schemes and their application to threshold cryptography
 Lower bound on the size of shares of nonperfect secret sharing schemes
 On sharing many secrets
 Combinatorial interpretation of secret sharing schemes
 A correlation attack on the binary sequence generators with timevarying output function
 On the linear complexity of nonlinearly filtered PNsequences
 Intrinsic statistical weakness of keystream generators
 Semibent functions
 Structures of cryptographic functions with strong avalanche characteristics
 Formal verification of cryptographic protocols: A survey
 Efficient electronic money
 How to prevent buying of votes in computer elections
 Design and analysis of key exchange protocols via secure channel identification
 Zeroknowledge proofs of computational power in the shared string model
 Information security aspects of spread spectrum systems
 Combinatorial structure of Acodes with rfold security
 MetaMessage recovery and MetaBlind signature schemes based on the discrete logarithm problem and their applications
 A digital signature scheme based on linear errorcorrecting block codes
 Secure acceleration of DSS signatures using insecure server
 The magic words are squeamish ossifrage
 Cryptanalysis of multiple modes of operation
 Linear cryptanalysis of LOKI and s 2DES
 Collisions and inversions for Damgård's whole hash function
 Attacking the SL 2 hashing scheme
 Security of the center in key distribution schemes
 Incidence structures for key sharing
 A publickey cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms
 Higher radix nonrestoring modular multiplication algorithm and publickey LSI architecture with limited hardware resources
 Low exponent attack against elliptic curve RSA
 A unified Markov approach to differential and linear cryptanalysis
 How to strengthen DES using existing hardware
 Some cryptographic properties of exponential functions
 Factoring: The DNA solution
 Can one design a signature scheme based on errorcorrecting codes?
 DESV1: A variation of the Data Encryption Standard (DES)
 Isbn
 9783540492368
 Label
 Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings
 Title
 Advances in Cryptology  ASIACRYPT'94
 Title remainder
 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings
 Statement of responsibility
 edited by Josef Pieprzyk, Reihanah SafaviNaini
 Language
 eng
 Summary
 This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms
 Cataloging source
 KIJ
 Dewey number
 005.82
 Image bit depth
 0
 Index
 index present
 LC call number
 QA76.9.A25
 LC item number
 I555 1994
 Literary form
 non fiction
 http://bibfra.me/vocab/lite/meetingDate
 1994
 http://bibfra.me/vocab/lite/meetingName
 International Conference on the Theory and Application of Cryptology
 Nature of contents

 dictionaries
 bibliography
 http://library.link/vocab/relatedWorkOrContributorDate
 1949
 http://library.link/vocab/relatedWorkOrContributorName

 Pieprzyk, Josef
 SafaviNaini, Reihanah
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 917
 http://library.link/vocab/subjectName

 Computer science
 Data encryption (Computer science)
 Coding theory
 Combinatorial analysis
 Coding theory
 Combinatorial analysis
 Computer science
 Data encryption (Computer science)
 Label
 Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent
 Contents
 Multifeature security through homomorphic encryption  Multiplicative nonabelian sharing schemes and their application to threshold cryptography  Lower bound on the size of shares of nonperfect secret sharing schemes  On sharing many secrets  Combinatorial interpretation of secret sharing schemes  A correlation attack on the binary sequence generators with timevarying output function  On the linear complexity of nonlinearly filtered PNsequences  Intrinsic statistical weakness of keystream generators  Semibent functions  Structures of cryptographic functions with strong avalanche characteristics  Formal verification of cryptographic protocols: A survey  Efficient electronic money  How to prevent buying of votes in computer elections  Design and analysis of key exchange protocols via secure channel identification  Zeroknowledge proofs of computational power in the shared string model  Information security aspects of spread spectrum systems  Combinatorial structure of Acodes with rfold security  MetaMessage recovery and MetaBlind signature schemes based on the discrete logarithm problem and their applications  A digital signature scheme based on linear errorcorrecting block codes  Secure acceleration of DSS signatures using insecure server  The magic words are squeamish ossifrage  Cryptanalysis of multiple modes of operation  Linear cryptanalysis of LOKI and s 2DES  Collisions and inversions for Damgård's whole hash function  Attacking the SL 2 hashing scheme  Security of the center in key distribution schemes  Incidence structures for key sharing  A publickey cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms  Higher radix nonrestoring modular multiplication algorithm and publickey LSI architecture with limited hardware resources  Low exponent attack against elliptic curve RSA  A unified Markov approach to differential and linear cryptanalysis  How to strengthen DES using existing hardware  Some cryptographic properties of exponential functions  Factoring: The DNA solution  Can one design a signature scheme based on errorcorrecting codes?  DESV1: A variation of the Data Encryption Standard (DES)
 Control code
 827357772
 Dimensions
 unknown
 Extent
 1 online resource
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9783540492368
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code

 c
 Other control number
 10.1007/BFb0000419
 Other physical details
 volumes: digital.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (OCoLC)827357772
 Label
 Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code

 cr
 Carrier MARC source
 rdacarrier
 Color
 not applicable
 Content category
 text
 Content type code

 txt
 Content type MARC source
 rdacontent
 Contents
 Multifeature security through homomorphic encryption  Multiplicative nonabelian sharing schemes and their application to threshold cryptography  Lower bound on the size of shares of nonperfect secret sharing schemes  On sharing many secrets  Combinatorial interpretation of secret sharing schemes  A correlation attack on the binary sequence generators with timevarying output function  On the linear complexity of nonlinearly filtered PNsequences  Intrinsic statistical weakness of keystream generators  Semibent functions  Structures of cryptographic functions with strong avalanche characteristics  Formal verification of cryptographic protocols: A survey  Efficient electronic money  How to prevent buying of votes in computer elections  Design and analysis of key exchange protocols via secure channel identification  Zeroknowledge proofs of computational power in the shared string model  Information security aspects of spread spectrum systems  Combinatorial structure of Acodes with rfold security  MetaMessage recovery and MetaBlind signature schemes based on the discrete logarithm problem and their applications  A digital signature scheme based on linear errorcorrecting block codes  Secure acceleration of DSS signatures using insecure server  The magic words are squeamish ossifrage  Cryptanalysis of multiple modes of operation  Linear cryptanalysis of LOKI and s 2DES  Collisions and inversions for Damgård's whole hash function  Attacking the SL 2 hashing scheme  Security of the center in key distribution schemes  Incidence structures for key sharing  A publickey cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms  Higher radix nonrestoring modular multiplication algorithm and publickey LSI architecture with limited hardware resources  Low exponent attack against elliptic curve RSA  A unified Markov approach to differential and linear cryptanalysis  How to strengthen DES using existing hardware  Some cryptographic properties of exponential functions  Factoring: The DNA solution  Can one design a signature scheme based on errorcorrecting codes?  DESV1: A variation of the Data Encryption Standard (DES)
 Control code
 827357772
 Dimensions
 unknown
 Extent
 1 online resource
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9783540492368
 Level of compression
 uncompressed
 Media category
 computer
 Media MARC source
 rdamedia
 Media type code

 c
 Other control number
 10.1007/BFb0000419
 Other physical details
 volumes: digital.
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number
 (OCoLC)827357772
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT944th/fwJ4unxwE1w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT944th/fwJ4unxwE1w/">Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT944th/fwJ4unxwE1w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/AdvancesinCryptologyASIACRYPT944th/fwJ4unxwE1w/">Advances in Cryptology  ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28  December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah SafaviNaini</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>