Advances in Cryptology - CRYPTO '99 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings /

Crypto '99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Bar...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Άλλοι συγγραφείς: Wiener, Michael (Επιμελητής έκδοσης, http://id.loc.gov/vocabulary/relators/edt)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 1999.
Έκδοση:1st ed. 1999.
Σειρά:Lecture Notes in Computer Science, 1666
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 06646nam a2200625 4500
001 978-3-540-48405-9
003 DE-He213
005 20191023202319.0
007 cr nn 008mamaa
008 121227s1999 gw | s |||| 0|eng d
020 |a 9783540484059  |9 978-3-540-48405-9 
024 7 |a 10.1007/3-540-48405-1  |2 doi 
040 |d GrThAP 
050 4 |a QA76.9.A25 
072 7 |a UR  |2 bicssc 
072 7 |a COM053000  |2 bisacsh 
072 7 |a UR  |2 thema 
072 7 |a UTN  |2 thema 
082 0 4 |a 005.8  |2 23 
245 1 0 |a Advances in Cryptology - CRYPTO '99  |h [electronic resource] :  |b 19th Annual International Cryptology Conference, Santa Barbara, California, USA, August 15-19, 1999 Proceedings /  |c edited by Michael Wiener. 
250 |a 1st ed. 1999. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 1999. 
300 |a XII, 648 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1666 
505 0 |a Public-Key Cryptanalysis I -- On the Security of RSA Padding -- Cryptanalysis of the HFE Public Key Cryptosystem by Relinearization -- The Hardness of the Hidden Subset Sum Problem and Its Cryptographic Implications -- Invited Lecture -- Information-Theoretic Cryptography -- Secure Communication and Computation -- Information Theoretically Secure Communication in the Limited Storage Space Model -- The All-or-Nothing Nature of Two-Party Secure Computation -- Distributed Cryptography -- Adaptive Security for Threshold Cryptosystems -- Two Party RSA Key Generation -- Robust Distributed Multiplication without Interaction -- A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting -- Secret-Key Cryptography -- Truncated Differentials and Skipjack -- Fast Correlation Attacks Based on Turbo Code Techniques -- Highly Nonlinear Resilient Functions Optimizing Siegenthaler's Inequality -- Message Authentication Codes -- UMAC: Fast and Secure Message Authentication -- Square Hash: Fast Message Authentication via Optimized Universal Hash Functions -- Constructing VIL-MACs from FIL-MACs: Message Authentication under Weakened Assumptions -- Stateless Evaluation of Pseudorandom Functions: Security Beyond the Birthday Barrier -- Public-Key Cryptanalysis II -- Cryptanalysis of the Goldreich-Goldwasser-Halevi Cryptosystem from Crypto '97 -- Weakness in Quaternion Signatures -- Cryptanalysis of "2R" Schemes -- Factoring N = p r q for Large r -- Traitor Tracing -- An Efficient Public Key Traitor Tracing Scheme -- Dynamic Traitor Tracing -- Efficient Methods for Integrating Traceability and Broadcast Encryption -- Differential Power Analysis -- Differential Power Analysis -- Towards Sound Approaches to Counteract Power-Analysis Attacks -- Signature Schemes -- Separability and Efficiency for Generic Group Signature Schemes -- A Forward-Secure Digital Signature Scheme -- Abuse-Free Optimistic Contract Signing -- Zero Knowledge -- Can Statistical Zero Knowledge Be Made Non-interactive? or On the Relationship of SZK and NISZK -- On Concurrent Zero-Knowledge with Pre-processing -- Asymmetric Encryption -- On the Security Properties of OAEP as an All-or-Nothing Transform -- Non-malleable Encryption: Equivalence between Two Notions, and an Indistinguishability-Based Characterization -- Secure Integration of Asymmetric and Symmetric Encryption Schemes -- Electronic Cash -- Auditable, Anonymous Electronic Cash -- Protocols and Broadcasting -- Oblivious Transfer with Adaptive Queries -- Compressing Cryptographic Resources -- Coding Constructions for Blacklisting Problems without Computational Assumptions -- An Information Theoretic Analysis of Rooted-Tree Based Secure Multicast Key Distribution Schemes. 
520 |a Crypto '99, the Nineteenth Annual Crypto Conference, was sponsored by the International Association for Cryptologic Research (IACR), in cooperation with the IEEE Computer Society Technical Committee on Security and Privacy and the Computer Science Department, University of California, Santa Barbara (UCSB). The General Chair, Donald Beaver, was responsible for local organization and registration. The Program Committee considered 167 papers and selected 38 for presentation. This year's conference program also included two invited lectures. I was pleased to include in the program UeliM aurer's presentation "Information Theoretic Cryptography" and Martin Hellman's presentation "The Evolution of Public Key Cryptography." The program also incorporated the traditional Rump Session for informal short presentations of new results, run by Stuart Haber. These proceedings include the revised versions of the 38 papers accepted by the Program Committee. These papers were selected from all the submissions to the conference based on originality, quality, and relevance to the field of cryptology. Revisions were not checked, and the authors bear full responsibility for the contents of their papers. 
650 0 |a Computer security. 
650 0 |a Coding theory. 
650 0 |a Information theory. 
650 0 |a Data encryption (Computer science). 
650 0 |a Algorithms. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 0 |a Computer communication systems. 
650 1 4 |a Systems and Data Security.  |0 http://scigraph.springernature.com/things/product-market-codes/I28060 
650 2 4 |a Coding and Information Theory.  |0 http://scigraph.springernature.com/things/product-market-codes/I15041 
650 2 4 |a Cryptology.  |0 http://scigraph.springernature.com/things/product-market-codes/I28020 
650 2 4 |a Algorithm Analysis and Problem Complexity.  |0 http://scigraph.springernature.com/things/product-market-codes/I16021 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
700 1 |a Wiener, Michael.  |e editor.  |4 edt  |4 http://id.loc.gov/vocabulary/relators/edt 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662198445 
776 0 8 |i Printed edition:  |z 9783540663478 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 1666 
856 4 0 |u https://doi.org/10.1007/3-540-48405-1  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)