000 | 06776cam a2201033Ia 4500 | ||
---|---|---|---|
001 | ocn262681054 | ||
003 | OCoLC | ||
005 | 20200626101904.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 081017s2005 gw a ob 101 0 eng d | ||
010 | _z 2005936359 | ||
040 |
_aGW5XE _beng _epn _cGW5XE _dQCL _dOKU _dCOO _dYNG _dNUI _dN$T _dOCLCQ _dE7B _dOCLCO _dOCLCQ _dOCLCF _dBEDGE _dOCLCQ _dNLGGC _dOCLCO _dIDEBK _dOCLCQ _dOCLCO _dOCL _dOCLCO _dOCLCQ _dEBLCP _dVT2 _dOCLCA _dOCLCQ _dESU _dOCLCQ _dOCLCO _dU3W _dSTF _dUAB _dOCLCQ _dCEF _dTFW _dAU@ _dOCLCQ _dWYU _dICG _dMERER _dYOU _dOCLCQ _dOCLCO _dAUD _dOL$ _dOCLCQ _dOCL _dERF _dWURST _dOCLCQ _dUKBTH _dOCLCQ |
||
015 |
_aGBA618475 _2bnb |
||
015 |
_a05,N48,0019 _2dnb |
||
016 | 7 |
_a013389550 _2Uk |
|
019 |
_a62346348 _a222315399 _a288293585 _a613674614 _a704275112 _a739131003 _a767174709 _a785777270 _a964875898 _a1005777352 _a1035656752 _a1044227875 _a1044235182 _a1056390729 _a1056395786 _a1066442070 _a1073064416 _a1081179532 _a1102298853 _a1105602193 _a1112575340 _a1112959808 |
||
020 | _a9783540324188 | ||
020 | _a3540324186 | ||
020 | _a354030276X | ||
020 | _a9783540302766 | ||
024 | 7 |
_a10.1007/11586821. _2doi |
|
028 | 5 | 2 | _a11586821 |
029 | 1 |
_aAU@ _b000048655418 |
|
029 | 1 |
_aAU@ _b000058158515 |
|
029 | 1 |
_aAU@ _b000065269251 |
|
029 | 1 |
_aNLGGC _b332465438 |
|
029 | 1 |
_aNZ1 _b13980726 |
|
035 |
_a(OCoLC)262681054 _z(OCoLC)62346348 _z(OCoLC)222315399 _z(OCoLC)288293585 _z(OCoLC)613674614 _z(OCoLC)704275112 _z(OCoLC)739131003 _z(OCoLC)767174709 _z(OCoLC)785777270 _z(OCoLC)964875898 _z(OCoLC)1005777352 _z(OCoLC)1035656752 _z(OCoLC)1044227875 _z(OCoLC)1044235182 _z(OCoLC)1056390729 _z(OCoLC)1056395786 _z(OCoLC)1066442070 _z(OCoLC)1073064416 _z(OCoLC)1081179532 _z(OCoLC)1102298853 _z(OCoLC)1105602193 _z(OCoLC)1112575340 _z(OCoLC)1112959808 |
||
037 |
_a978-3-540-30276-6 _bSpringer _nhttp://www.springerlink.com |
||
050 | 4 |
_aQA268 _b.I45 2005eb |
|
072 | 7 |
_aCOM _x083000 _2bisacsh |
|
072 | 7 |
_aURY. _2bicssc |
|
082 | 0 | 4 |
_a005.82 _222 |
084 |
_aSS 4800 _2rvk |
||
084 |
_a004 _2sdnb |
||
084 |
_aDAT 580f _2stub |
||
084 |
_aDAT 465f _2stub |
||
049 | _aMAIN | ||
111 | 2 |
_aIMA International Conference _n(10th : _d2005 : _cCirencester, England) _927308 |
|
245 | 1 | 0 |
_aCryptography and coding : _b10th IMA International Conference, Cirencester, UK, December 19-21, 2005 : proceedings / _cNigel P. Smart (ed.). |
260 |
_aBerlin : _bSpringer, _c©2005. |
||
300 |
_a1 online resource (xi, 459 pages) : _billustrations |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture notes in computer science, _x0302-9743 ; _v3796 |
|
490 | _aSerienbezeichnung | ||
504 | _aIncludes bibliographical references and index. | ||
588 | 0 | _aPrint version record. | |
505 | 0 | _aInvited Papers -- Abstract Models of Computation in Cryptography -- Pairing-Based Cryptography at High Security Levels -- Improved Decoding of Interleaved AG Codes -- Coding Theory -- Performance Improvement of Turbo Code Based on the Extrinsic Information Transition Characteristics -- A Trellis-Based Bound on (2,1)-Separating Codes -- Tessellation Based Multiple Description Coding -- Exploiting Coding Theory for Collision Attacks on SHA-1 -- Signatures and Signcryption -- Hash Based Digital Signature Schemes -- A General Construction for Simultaneous Signing and Encrypting -- Non-interactive Designated Verifier Proofs and Undeniable Signatures -- Symmetric Cryptography -- Partial Key Recovery Attacks on XCBC, TMAC and OMAC -- Domain Expansion of MACs: Alternative Uses of the FIL-MAC -- Normality of Vectorial Functions -- Related-Key Differential Attacks on Cobra-H64 and Cobra-H128 -- Side Channels -- The Physically Observable Security of Signature Schemes -- On the Automatic Construction of Indistinguishable Operations -- Efficient Countermeasures for Thwarting the SCA Attacks on the Frobenius Based Methods -- Algebraic Cryptanalysis -- Complexity Estimates for the F 4 Attack on the Perturbed Matsumoto-Imai Cryptosystem -- An Algebraic Framework for Cipher Embeddings -- Probabilistic Algebraic Attacks -- Information Theoretic Applications -- Unconditionally Secure Information Authentication in Presence of Erasures -- Generalized Strong Extractors and Deterministic Privacy Amplification -- On Threshold Self-healing Key Distribution Schemes -- Number Theoretic Foundations -- Concrete Security of the Blum-Blum-Shub Pseudorandom Generator -- The Equivalence Between the DHP and DLP for Elliptic Curves Used in Practical Applications, Revisited -- Pairings on Elliptic Curves over Finite Commutative Rings -- Public Key and ID-Based Encryption Schemes -- A Key Encapsulation Mechanism for NTRU -- Efficient Identity-Based Key Encapsulation to Multiple Parties -- Security Proof of Sakai-Kasahara's Identity-Based Encryption Scheme. | |
546 | _aEnglish. | ||
650 | 0 |
_aCoding theory _vCongresses. _915981 |
|
650 | 0 |
_aCryptography _vCongresses. _914592 |
|
650 | 6 |
_aCodage _vCongrès. _926667 |
|
650 | 6 |
_aCryptographie _vCongrès. _914593 |
|
650 | 7 |
_aCOMPUTERS _xSecurity _xCryptography. _2bisacsh _919340 |
|
650 | 7 |
_aInformatique. _2eclas _914930 |
|
650 | 7 |
_aCoding theory. _2fast _0(OCoLC)fst00866237 _91927 |
|
650 | 7 |
_aCryptography. _2fast _0(OCoLC)fst00884552 _927309 |
|
650 | 7 |
_aCodierung _2gnd _92653 |
|
650 | 7 |
_aKryptologie _2gnd _927310 |
|
653 | 0 | 0 | _awiskunde |
653 | 0 | 0 | _amathematics |
653 | 0 | 0 | _acomputerwetenschappen |
653 | 0 | 0 | _acomputer sciences |
653 | 0 | 0 | _ainformatietheorie |
653 | 0 | 0 | _ainformation theory |
653 | 0 | 0 | _acomputernetwerken |
653 | 0 | 0 | _acomputer networks |
653 | 0 | 0 | _agegevensbeheer |
653 | 0 | 0 | _adata management |
653 | 1 | 0 | _aInformation and Communication Technology (General) |
653 | 1 | 0 | _aInformatie- en communicatietechnologie (algemeen) |
655 | 4 |
_aElectronic books. _9396 |
|
655 | 7 |
_aConference papers and proceedings. _2fast _0(OCoLC)fst01423772 _96065 |
|
655 | 7 |
_aCirencester (2005) _2swd _927311 |
|
655 | 7 |
_aKongress. _2swd _92843 |
|
700 | 1 |
_aSmart, Nigel P. _q(Nigel Paul), _d1967- _925332 |
|
776 | 0 | 8 |
_iPrint version: _aIMA International Conference (10th : 2005 : Cirencester, England). _tCryptography and coding. _dBerlin : Springer, ©2005 _z354030276X _z9783540302766 _w(DLC) 2005936359 _w(OCoLC)62972637 |
830 | 0 |
_aLecture notes in computer science ; _v3796. _x0302-9743 _927312 |
|
856 | 4 | 0 | _uhttps://link-springer-com.libraryproxy.ist.ac.at/book/10.1007/11586821 |
938 |
_aProQuest Ebook Central _bEBLB _nEBL3067771 |
||
938 |
_aebrary _bEBRY _nebr10528683 |
||
938 |
_aEBSCOhost _bEBSC _n183322 |
||
938 |
_aProQuest MyiLibrary Digital eBook Collection _bIDEB _ncis23803052 |
||
994 |
_a92 _bATIST |
||
999 |
_c377925 _d377925 |