The Resource Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini
Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini
Resource Information
The item Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 1 library branch.
Resource Information
The item Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 1 library branch.
- Summary
- This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms
- Language
- eng
- Extent
- 1 online resource
- Contents
-
- Multifeature security through homomorphic encryption
- Multiplicative non-abelian sharing schemes and their application to threshold cryptography
- Lower bound on the size of shares of nonperfect secret sharing schemes
- On sharing many secrets
- Combinatorial interpretation of secret sharing schemes
- A correlation attack on the binary sequence generators with time-varying output function
- On the linear complexity of nonlinearly filtered PN-sequences
- Intrinsic statistical weakness of keystream generators
- Semi-bent functions
- Structures of cryptographic functions with strong avalanche characteristics
- Formal verification of cryptographic protocols: A survey
- Efficient electronic money
- How to prevent buying of votes in computer elections
- Design and analysis of key exchange protocols via secure channel identification
- Zero-knowledge proofs of computational power in the shared string model
- Information security aspects of spread spectrum systems
- Combinatorial structure of A-codes with r-fold security
- Meta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications
- A digital signature scheme based on linear error-correcting block codes
- Secure acceleration of DSS signatures using insecure server
- The magic words are squeamish ossifrage
- Cryptanalysis of multiple modes of operation
- Linear cryptanalysis of LOKI and s 2DES
- Collisions and inversions for Damgård's whole hash function
- Attacking the SL 2 hashing scheme
- Security of the center in key distribution schemes
- Incidence structures for key sharing
- A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms
- Higher radix nonrestoring modular multiplication algorithm and public-key LSI architecture with limited hardware resources
- Low exponent attack against elliptic curve RSA
- A unified Markov approach to differential and linear cryptanalysis
- How to strengthen DES using existing hardware
- Some cryptographic properties of exponential functions
- Factoring: The DNA solution
- Can one design a signature scheme based on error-correcting codes?
- DESV-1: A variation of the Data Encryption Standard (DES)
- Isbn
- 9783540492368
- Label
- Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings
- Title
- Advances in Cryptology -- ASIACRYPT'94
- Title remainder
- 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings
- Statement of responsibility
- edited by Josef Pieprzyk, Reihanah Safavi-Naini
- Language
- eng
- Summary
- This volume presents the proceedings of the ASIACRYPT '94 Workshop devoted to the Theory and Application of Cryptology, held at the University of Wollongong, New South Wales, Australia in November/December 1994. Besides 30 revised full papers selected from a total of 99 submissions, there are three invited papers and four papers from the traditional rump session. The papers cover the whole spectrum of cryptology; they are organized in sections on secret sharing, stream ciphers, cryptographic functions, protocols, authentication and digital signatures, cryptanalysis, hash functions, key distribution, public key cryptography, and block cipher algorithms
- Cataloging source
- KIJ
- Dewey number
- 005.82
- Image bit depth
- 0
- Index
- index present
- LC call number
- QA76.9.A25
- LC item number
- I555 1994
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 1994
- http://bibfra.me/vocab/lite/meetingName
- International Conference on the Theory and Application of Cryptology
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorDate
- 1949-
- http://library.link/vocab/relatedWorkOrContributorName
-
- Pieprzyk, Josef
- Safavi-Naini, Reihanah
- Series statement
- Lecture Notes in Computer Science,
- Series volume
- 917
- http://library.link/vocab/subjectName
-
- Computer science
- Data encryption (Computer science)
- Coding theory
- Combinatorial analysis
- Coding theory
- Combinatorial analysis
- Computer science
- Data encryption (Computer science)
- Label
- Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini
- Antecedent source
- mixed
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Multifeature security through homomorphic encryption -- Multiplicative non-abelian sharing schemes and their application to threshold cryptography -- Lower bound on the size of shares of nonperfect secret sharing schemes -- On sharing many secrets -- Combinatorial interpretation of secret sharing schemes -- A correlation attack on the binary sequence generators with time-varying output function -- On the linear complexity of nonlinearly filtered PN-sequences -- Intrinsic statistical weakness of keystream generators -- Semi-bent functions -- Structures of cryptographic functions with strong avalanche characteristics -- Formal verification of cryptographic protocols: A survey -- Efficient electronic money -- How to prevent buying of votes in computer elections -- Design and analysis of key exchange protocols via secure channel identification -- Zero-knowledge proofs of computational power in the shared string model -- Information security aspects of spread spectrum systems -- Combinatorial structure of A-codes with r-fold security -- Meta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications -- A digital signature scheme based on linear error-correcting block codes -- Secure acceleration of DSS signatures using insecure server -- The magic words are squeamish ossifrage -- Cryptanalysis of multiple modes of operation -- Linear cryptanalysis of LOKI and s 2DES -- Collisions and inversions for Damgård's whole hash function -- Attacking the SL 2 hashing scheme -- Security of the center in key distribution schemes -- Incidence structures for key sharing -- A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms -- Higher radix nonrestoring modular multiplication algorithm and public-key LSI architecture with limited hardware resources -- Low exponent attack against elliptic curve RSA -- A unified Markov approach to differential and linear cryptanalysis -- How to strengthen DES using existing hardware -- Some cryptographic properties of exponential functions -- Factoring: The DNA solution -- Can one design a signature scheme based on error-correcting codes? -- DESV-1: A variation of the Data Encryption Standard (DES)
- Control code
- 827357772
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- multiple file formats
- Form of item
- online
- Isbn
- 9783540492368
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/BFb0000419
- Other physical details
- volumes: digital.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (OCoLC)827357772
- Label
- Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini
- Antecedent source
- mixed
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- not applicable
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Multifeature security through homomorphic encryption -- Multiplicative non-abelian sharing schemes and their application to threshold cryptography -- Lower bound on the size of shares of nonperfect secret sharing schemes -- On sharing many secrets -- Combinatorial interpretation of secret sharing schemes -- A correlation attack on the binary sequence generators with time-varying output function -- On the linear complexity of nonlinearly filtered PN-sequences -- Intrinsic statistical weakness of keystream generators -- Semi-bent functions -- Structures of cryptographic functions with strong avalanche characteristics -- Formal verification of cryptographic protocols: A survey -- Efficient electronic money -- How to prevent buying of votes in computer elections -- Design and analysis of key exchange protocols via secure channel identification -- Zero-knowledge proofs of computational power in the shared string model -- Information security aspects of spread spectrum systems -- Combinatorial structure of A-codes with r-fold security -- Meta-Message recovery and Meta-Blind signature schemes based on the discrete logarithm problem and their applications -- A digital signature scheme based on linear error-correcting block codes -- Secure acceleration of DSS signatures using insecure server -- The magic words are squeamish ossifrage -- Cryptanalysis of multiple modes of operation -- Linear cryptanalysis of LOKI and s 2DES -- Collisions and inversions for Damgård's whole hash function -- Attacking the SL 2 hashing scheme -- Security of the center in key distribution schemes -- Incidence structures for key sharing -- A public-key cryptosystem and a digital signature system based on the Lucas function analogue to discrete logarithms -- Higher radix nonrestoring modular multiplication algorithm and public-key LSI architecture with limited hardware resources -- Low exponent attack against elliptic curve RSA -- A unified Markov approach to differential and linear cryptanalysis -- How to strengthen DES using existing hardware -- Some cryptographic properties of exponential functions -- Factoring: The DNA solution -- Can one design a signature scheme based on error-correcting codes? -- DESV-1: A variation of the Data Encryption Standard (DES)
- Control code
- 827357772
- Dimensions
- unknown
- Extent
- 1 online resource
- File format
- multiple file formats
- Form of item
- online
- Isbn
- 9783540492368
- Level of compression
- uncompressed
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/BFb0000419
- Other physical details
- volumes: digital.
- Quality assurance targets
- absent
- Reformatting quality
- access
- Specific material designation
- remote
- System control number
- (OCoLC)827357772
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Advances-in-Cryptology----ASIACRYPT94--4th/fwJ4unxwE1w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Advances-in-Cryptology----ASIACRYPT94--4th/fwJ4unxwE1w/">Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Advances-in-Cryptology----ASIACRYPT94--4th/fwJ4unxwE1w/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Advances-in-Cryptology----ASIACRYPT94--4th/fwJ4unxwE1w/">Advances in Cryptology -- ASIACRYPT'94 : 4th International Conferences on the Theory and Applications of Cryptology Wollongong, Australia, November 28 - December 1, 1994 Proceedings, edited by Josef Pieprzyk, Reihanah Safavi-Naini</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>