The Resource Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.)
Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.)
Resource Information
The item Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.This item is available to borrow from 2 library branches.
Resource Information
The item Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Missouri Libraries.
This item is available to borrow from 2 library branches.
- Summary
- "These are the proceedings of Crypto 2005, the 25th Annual International Cryptology Conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Science Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference was held in Santa Barbara, California, August 14-18, 2005."
- Language
- eng
- Extent
- 1 online resource (xi, 568 pages)
- Contents
-
- Efficient Collision Search Attacks on SHA-0
- Finding Collisions in the Full SHA-1
- Pebbling and Proofs of Work
- Composition Does Not Imply Adaptive Security
- On the Discrete Logarithm Problem on Algebraic Tori
- A Practical Attack on a Braid Group Based Cryptographic Protocol
- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption
- Unconditional Characterizations of Non-interactive Zero-Knowledge
- Impossibility and Feasibility Results for Zero Knowledge with Public Keys
- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors
- A Formal Treatment of Onion Routing
- Simple and Efficient Shuffling with Provable Correctness and ZK Privacy
- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions
- Private Searching on Streaming Data
- Privacy-Preserving Set Operations
- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
- Generic Transformation for Scalable Broadcast Encryption Schemes
- Authenticating Pervasive Devices with Human Protocols
- Secure Communications over Insecure Channels Based on Short Authenticated Strings
- On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes
- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields
- Secure Computation Without Authentication
- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator
- Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems
- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes
- Merkle-Damgård Revisited: How to Construct a Hash Function
- On the Generic Insecurity of the Full Domain Hash
- New Monotones and Lower Bounds in Unconditional Two-Party Computation
- One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption
- A Quantum Cipher with Near Optimal Key-Recycling
- An Efficient CDH-Based Signature Scheme with a Tight Security Reduction
- Improved Security Analyses for CBC MACs
- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Isbn
- 9783540318705
- Label
- Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings
- Title
- Advances in cryptology
- Title remainder
- CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings
- Statement of responsibility
- Victor Shoup (ed.)
- Title variation
- CRYPTO 2005
- Subject
-
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Cryptographie (Informatique)
- Cryptography
- Cryptography
- Cryptography -- Congresses
- Data transmission systems -- Security measures
- Data transmission systems -- Security measures
- Data transmission systems -- Security measures -- Congresses
- Informatique
- Sécurité informatique
- Computers -- Access control
- Language
- eng
- Summary
- "These are the proceedings of Crypto 2005, the 25th Annual International Cryptology Conference. The conference was sponsored by the International Association for Cryptologic Research (IACR) in cooperation with the IEEE Computer Science Technical Committee on Security and Privacy and the Computer Science Department of the University of California at Santa Barbara. The conference was held in Santa Barbara, California, August 14-18, 2005."
- Cataloging source
- GW5XE
- Dewey number
- 005.82
- Illustrations
- illustrations
- Index
- index present
- LC call number
- QA76.9 .A25
- LC item number
- C794 2005eb
- Literary form
- non fiction
- http://bibfra.me/vocab/lite/meetingDate
- 2005
- http://bibfra.me/vocab/lite/meetingName
- CRYPTO (Conference)
- Nature of contents
-
- dictionaries
- bibliography
- http://library.link/vocab/relatedWorkOrContributorName
- Shoup, Victor
- Series statement
- Lecture notes in computer science,
- Series volume
- 3621
- http://library.link/vocab/subjectName
-
- Computers
- Cryptography
- Data transmission systems
- Informatique
- Computers
- Cryptography
- Data transmission systems
- Sécurité informatique
- Cryptographie (Informatique)
- Label
- Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characterizations of Non-interactive Zero-Knowledge -- Impossibility and Feasibility Results for Zero Knowledge with Public Keys -- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors -- A Formal Treatment of Onion Routing -- Simple and Efficient Shuffling with Provable Correctness and ZK Privacy -- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions -- Private Searching on Streaming Data -- Privacy-Preserving Set Operations -- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys -- Generic Transformation for Scalable Broadcast Encryption Schemes -- Authenticating Pervasive Devices with Human Protocols -- Secure Communications over Insecure Channels Based on Short Authenticated Strings -- On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes -- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields -- Secure Computation Without Authentication -- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator -- Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems -- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes -- Merkle-Damgård Revisited: How to Construct a Hash Function -- On the Generic Insecurity of the Full Domain Hash -- New Monotones and Lower Bounds in Unconditional Two-Party Computation -- One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption -- A Quantum Cipher with Near Optimal Key-Recycling -- An Efficient CDH-Based Signature Scheme with a Tight Security Reduction -- Improved Security Analyses for CBC MACs -- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Control code
- 262681380
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 568 pages)
- Form of item
- online
- Isbn
- 9783540318705
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/11535218
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-28114-6
- Specific material designation
- remote
- System control number
- (OCoLC)262681380
- Label
- Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.)
- Bibliography note
- Includes bibliographical references and index
- Carrier category
- online resource
- Carrier category code
-
- cr
- Carrier MARC source
- rdacarrier
- Color
- multicolored
- Content category
- text
- Content type code
-
- txt
- Content type MARC source
- rdacontent
- Contents
- Efficient Collision Search Attacks on SHA-0 -- Finding Collisions in the Full SHA-1 -- Pebbling and Proofs of Work -- Composition Does Not Imply Adaptive Security -- On the Discrete Logarithm Problem on Algebraic Tori -- A Practical Attack on a Braid Group Based Cryptographic Protocol -- The Conditional Correlation Attack: A Practical Attack on Bluetooth Encryption -- Unconditional Characterizations of Non-interactive Zero-Knowledge -- Impossibility and Feasibility Results for Zero Knowledge with Public Keys -- Communication-Efficient Non-interactive Proofs of Knowledge with Online Extractors -- A Formal Treatment of Onion Routing -- Simple and Efficient Shuffling with Provable Correctness and ZK Privacy -- Searchable Encryption Revisited: Consistency Properties, Relation to Anonymous IBE, and Extensions -- Private Searching on Streaming Data -- Privacy-Preserving Set Operations -- Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys -- Generic Transformation for Scalable Broadcast Encryption Schemes -- Authenticating Pervasive Devices with Human Protocols -- Secure Communications over Insecure Channels Based on Short Authenticated Strings -- On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes -- Black-Box Secret Sharing from Primitive Sets in Algebraic Number Fields -- Secure Computation Without Authentication -- Constant-Round Multiparty Computation Using a Black-Box Pseudorandom Generator -- Secure Computation of Constant-Depth Circuits with Applications to Database Search Problems -- Analysis of Random Oracle Instantiation Scenarios for OAEP and Other Practical Schemes -- Merkle-Damgård Revisited: How to Construct a Hash Function -- On the Generic Insecurity of the Full Domain Hash -- New Monotones and Lower Bounds in Unconditional Two-Party Computation -- One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption -- A Quantum Cipher with Near Optimal Key-Recycling -- An Efficient CDH-Based Signature Scheme with a Tight Security Reduction -- Improved Security Analyses for CBC MACs -- HMQV: A High-Performance Secure Diffie-Hellman Protocol
- Control code
- 262681380
- Dimensions
- unknown
- Extent
- 1 online resource (xi, 568 pages)
- Form of item
- online
- Isbn
- 9783540318705
- Media category
- computer
- Media MARC source
- rdamedia
- Media type code
-
- c
- Other control number
- 10.1007/11535218
- Other physical details
- illustrations.
- http://library.link/vocab/ext/overdrive/overdriveId
- 978-3-540-28114-6
- Specific material designation
- remote
- System control number
- (OCoLC)262681380
Subject
- Computers -- Access control
- Computers -- Access control -- Congresses
- Conference papers and proceedings
- Conference papers and proceedings
- Cryptographie (Informatique)
- Cryptography
- Cryptography
- Cryptography -- Congresses
- Data transmission systems -- Security measures
- Data transmission systems -- Security measures
- Data transmission systems -- Security measures -- Congresses
- Informatique
- Sécurité informatique
- Computers -- Access control
Genre
Member of
Library Links
Embed
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Advances-in-cryptology--CRYPTO-2005--25th/jsjv064EJNI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Advances-in-cryptology--CRYPTO-2005--25th/jsjv064EJNI/">Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data - Experimental
Data Citation of the Item Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa fa-external-link-square fa-fw"></i> Data from <span resource="http://link.library.missouri.edu/portal/Advances-in-cryptology--CRYPTO-2005--25th/jsjv064EJNI/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.library.missouri.edu/portal/Advances-in-cryptology--CRYPTO-2005--25th/jsjv064EJNI/">Advances in cryptology : CRYPTO 2005 : 25th Annual International Cryptology Conference, Santa Barbara, California, USA, August 14-18, 2005 : proceedings, Victor Shoup (ed.)</a></span> - <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.library.missouri.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.library.missouri.edu/">University of Missouri Libraries</a></span></span></span></span></div>