Borrow it
 Architecture Library
 Bizzell Memorial Library
 Boorstin Collection
 Chinese Literature Translation Archive
 Engineering Library
 Fine Arts Library
 Harry W. Bass Business History Collection
 History of Science Collections
 John and Mary Nichols Rare Books and Special Collections
 Library Service Center
 Price College Digital Library
 Western History Collections
The Resource Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource)
Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource)
Resource Information
The item Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.This item is available to borrow from all library branches.
Resource Information
The item Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource) represents a specific, individual, material embodiment of a distinct intellectual or artistic creation found in University of Oklahoma Libraries.
This item is available to borrow from all library branches.
 Summary
 The origins of the Asiacrypt series of conferences can be traced back to 1990, when the ?rst Auscrypt conference was held, although the name Asiacrypt was ?rst used for the 1991 conference in Japan. Starting with Asiacrypt 2000, the conference is now one of three annual conferences organized by the Inter tional Association for Cryptologic Research (IACR). The continuing success of Asiacrypt is in no small part due to the e?orts of the Asiacrypt Steering C mittee (ASC) and the strong support of the IACR Board of Directors. There were 153 papers submitted to Asiacrypt 2001 and 33 of these were accepted for inclusion in these proceedings. The authors of every paper, whether accepted or not, made a valued contribution to the success of the conference. Sending out rejection noti?cations to so many hard working authors is one of the most unpleasant tasks of the Program Chair. The review process lasted some 10 weeks and consisted of an initial refe eing phase followed by an extensive discussion period. My heartfelt thanks go to all members of the Program Committee who put in extreme amounts of time to give their expert analysis and opinions on the submissions. All papers were reviewed by at least three committee members; in many cases, particularly for those papers submitted by committee members, additional reviews were obt ned. Specialist reviews were provided by an army of external reviewers without whom our decisions would have been much more di?cult
 Language

 eng
 eng
 Edition
 1st ed. 2001.
 Extent
 1 online resource (XI, 601 p. 22 illus.)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Contents

 Lattice Based Cryptography
 Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001
 On the Insecurity of a ServerAided RSA Protocol
 The Modular Inversion Hidden Number Problem
 Human Identification
 Secure Human Identification Protocols
 Invited Talk
 Unbelievable Security Matching AES Security Using Public Key Systems
 Practical Public Key Cryptography
 A Probable Prime Test with Very High Confidence for n ? 1 mod 4
 Computation of Discrete Logarithms in
 Speeding Up XTR
 An Efficient Implementation of Braid Groups
 Cryptography Based on Coding Theory
 How to Achieve a McElieceBased Digital Signature Scheme
 Efficient Traitor Tracing Algorithms Using List Decoding
 Block Ciphers
 Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis
 KnownIV Attacks on Triple Modes of Operation of Block Ciphers
 Generic Attacks on Feistel Schemes
 A Compact Rijndael Hardware Architecture with SBox Optimization
 Provable Security
 Provable Security of KASUMI and 3GPP Encryption Mode f8
 Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices
 Provably Authenticated Group DiffieHellman Key Exchange — The Dynamic Case
 Threshold Cryptography
 Fully Distributed Threshold RSA under Standard Assumptions
 Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes
 Threshold Cryptosystems Secure against ChosenCiphertext Attacks
 TwoParty Protocols
 Oblivious Polynomial Evaluation and Oblivious Neural Learning
 Mutually Independent Commitments
 Zero Knowledge
 Efficient ZeroKnowledge Authentication Based on a Linear Algebra Problem MinRank
 Responsive Round Complexity and Concurrent ZeroKnowledge
 Cryptographic Building Blocks
 Practical Construction and Analysis of PseudoRandomness Primitives
 Autocorrelation Coefficients and Correlation Immunity of Boolean Functions
 Elliptic Curve Cryptography
 An Extension of Kedlaya’s PointCounting Algorithm to Superelliptic Curves
 Supersingular Curves in Cryptography
 Short Signatures from the Weil Pairing
 SelfBlindable Credential Certificates from the Weil Pairing
 Anonymity
 How to Leak a Secret
 KeyPrivacy in PublicKey Encryption
 Provably Secure air Blind Signatures with Tight Revocation
 Isbn
 9783540456827
 Label
 Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings
 Title
 Advances in Cryptology — ASIACRYPT 2001
 Title remainder
 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings
 Statement of responsibility
 edited by Colin Boyd
 Subject

 Information Systems
 Operating systems (Computers)
 Operating Systems
 Management of Computing and Information Systems
 Computer software
 Algorithm Analysis and Problem Complexity
 Cryptology
 Computer Communication Networks
 Data encryption (Computer science)
 Computer Communication Networks
 Computational complexity
 Discrete Mathematics in Computer Science
 Language

 eng
 eng
 Summary
 The origins of the Asiacrypt series of conferences can be traced back to 1990, when the ?rst Auscrypt conference was held, although the name Asiacrypt was ?rst used for the 1991 conference in Japan. Starting with Asiacrypt 2000, the conference is now one of three annual conferences organized by the Inter tional Association for Cryptologic Research (IACR). The continuing success of Asiacrypt is in no small part due to the e?orts of the Asiacrypt Steering C mittee (ASC) and the strong support of the IACR Board of Directors. There were 153 papers submitted to Asiacrypt 2001 and 33 of these were accepted for inclusion in these proceedings. The authors of every paper, whether accepted or not, made a valued contribution to the success of the conference. Sending out rejection noti?cations to so many hard working authors is one of the most unpleasant tasks of the Program Chair. The review process lasted some 10 weeks and consisted of an initial refe eing phase followed by an extensive discussion period. My heartfelt thanks go to all members of the Program Committee who put in extreme amounts of time to give their expert analysis and opinions on the submissions. All papers were reviewed by at least three committee members; in many cases, particularly for those papers submitted by committee members, additional reviews were obt ned. Specialist reviews were provided by an army of external reviewers without whom our decisions would have been much more di?cult
 http://bibfra.me/vocab/relation/corporateauthor
 0yVqW59z5Os
 Dewey number
 005.8
 http://bibfra.me/vocab/relation/httpidlocgovvocabularyrelatorsedt
 mjw1nQHo2pU
 Image bit depth
 0
 Language note
 English
 LC call number
 QA76.9.D335
 Literary form
 non fiction
 http://bibfra.me/vocab/lite/meetingDate
 2001
 http://bibfra.me/vocab/lite/meetingName
 International Conference on the Theory and Application of Cryptology and Information Security
 Nature of contents
 dictionaries
 http://bibfra.me/vocab/lite/organizationName
 International Conference on the Theory and Application of Cryptology and Information Security
 http://library.link/vocab/relatedWorkOrContributorName

 International Conference on the Theory and Application of Cryptology and Information Security
 Boyd, Colin.
 Series statement
 Lecture Notes in Computer Science,
 Series volume
 2248
 http://library.link/vocab/subjectName

 Data encryption (Computer science)
 Computational complexity
 Operating systems (Computers)
 Computer software
 Computer Communication Networks
 Information Systems
 Cryptology
 Discrete Mathematics in Computer Science
 Operating Systems
 Algorithm Analysis and Problem Complexity
 Computer Communication Networks
 Management of Computing and Information Systems
 Label
 Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code
 cr
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Contents
 Lattice Based Cryptography  Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001  On the Insecurity of a ServerAided RSA Protocol  The Modular Inversion Hidden Number Problem  Human Identification  Secure Human Identification Protocols  Invited Talk  Unbelievable Security Matching AES Security Using Public Key Systems  Practical Public Key Cryptography  A Probable Prime Test with Very High Confidence for n ? 1 mod 4  Computation of Discrete Logarithms in  Speeding Up XTR  An Efficient Implementation of Braid Groups  Cryptography Based on Coding Theory  How to Achieve a McElieceBased Digital Signature Scheme  Efficient Traitor Tracing Algorithms Using List Decoding  Block Ciphers  Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis  KnownIV Attacks on Triple Modes of Operation of Block Ciphers  Generic Attacks on Feistel Schemes  A Compact Rijndael Hardware Architecture with SBox Optimization  Provable Security  Provable Security of KASUMI and 3GPP Encryption Mode f8  Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices  Provably Authenticated Group DiffieHellman Key Exchange — The Dynamic Case  Threshold Cryptography  Fully Distributed Threshold RSA under Standard Assumptions  Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes  Threshold Cryptosystems Secure against ChosenCiphertext Attacks  TwoParty Protocols  Oblivious Polynomial Evaluation and Oblivious Neural Learning  Mutually Independent Commitments  Zero Knowledge  Efficient ZeroKnowledge Authentication Based on a Linear Algebra Problem MinRank  Responsive Round Complexity and Concurrent ZeroKnowledge  Cryptographic Building Blocks  Practical Construction and Analysis of PseudoRandomness Primitives  Autocorrelation Coefficients and Correlation Immunity of Boolean Functions  Elliptic Curve Cryptography  An Extension of Kedlaya’s PointCounting Algorithm to Superelliptic Curves  Supersingular Curves in Cryptography  Short Signatures from the Weil Pairing  SelfBlindable Credential Certificates from the Weil Pairing  Anonymity  How to Leak a Secret  KeyPrivacy in PublicKey Encryption  Provably Secure air Blind Signatures with Tight Revocation
 Dimensions
 unknown
 Edition
 1st ed. 2001.
 Extent
 1 online resource (XI, 601 p. 22 illus.)
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9783540456827
 Level of compression
 uncompressed
 Media category
 computer
 Media type code
 c
 Other control number
 10.1007/3540456821
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number

 (CKB)1000000000211652
 (SSID)ssj0000320907
 (PQKBManifestationID)11213464
 (PQKBTitleCode)TC0000320907
 (PQKBWorkID)10258590
 (PQKB)11469524
 (DEHe213)9783540456827
 (MiAaPQ)EBC3071725
 (EXLCZ)991000000000211652
 Label
 Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource)
 Note
 Bibliographic Level Mode of Issuance: Monograph
 Antecedent source
 mixed
 Bibliography note
 Includes bibliographical references and index
 Carrier category
 online resource
 Carrier category code
 cr
 Color
 not applicable
 Content category
 text
 Content type code
 txt
 Contents
 Lattice Based Cryptography  Cryptanalysis of the NTRU Signature Scheme (NSS) from Eurocrypt 2001  On the Insecurity of a ServerAided RSA Protocol  The Modular Inversion Hidden Number Problem  Human Identification  Secure Human Identification Protocols  Invited Talk  Unbelievable Security Matching AES Security Using Public Key Systems  Practical Public Key Cryptography  A Probable Prime Test with Very High Confidence for n ? 1 mod 4  Computation of Discrete Logarithms in  Speeding Up XTR  An Efficient Implementation of Braid Groups  Cryptography Based on Coding Theory  How to Achieve a McElieceBased Digital Signature Scheme  Efficient Traitor Tracing Algorithms Using List Decoding  Block Ciphers  Security of Reduced Version of the Block Cipher Camellia against Truncated and Impossible Differential Cryptanalysis  KnownIV Attacks on Triple Modes of Operation of Block Ciphers  Generic Attacks on Feistel Schemes  A Compact Rijndael Hardware Architecture with SBox Optimization  Provable Security  Provable Security of KASUMI and 3GPP Encryption Mode f8  Efficient and Mutually Authenticated Key Exchange for Low Power Computing Devices  Provably Authenticated Group DiffieHellman Key Exchange — The Dynamic Case  Threshold Cryptography  Fully Distributed Threshold RSA under Standard Assumptions  Adaptive Security in the Threshold Setting: From Cryptosystems to Signature Schemes  Threshold Cryptosystems Secure against ChosenCiphertext Attacks  TwoParty Protocols  Oblivious Polynomial Evaluation and Oblivious Neural Learning  Mutually Independent Commitments  Zero Knowledge  Efficient ZeroKnowledge Authentication Based on a Linear Algebra Problem MinRank  Responsive Round Complexity and Concurrent ZeroKnowledge  Cryptographic Building Blocks  Practical Construction and Analysis of PseudoRandomness Primitives  Autocorrelation Coefficients and Correlation Immunity of Boolean Functions  Elliptic Curve Cryptography  An Extension of Kedlaya’s PointCounting Algorithm to Superelliptic Curves  Supersingular Curves in Cryptography  Short Signatures from the Weil Pairing  SelfBlindable Credential Certificates from the Weil Pairing  Anonymity  How to Leak a Secret  KeyPrivacy in PublicKey Encryption  Provably Secure air Blind Signatures with Tight Revocation
 Dimensions
 unknown
 Edition
 1st ed. 2001.
 Extent
 1 online resource (XI, 601 p. 22 illus.)
 File format
 multiple file formats
 Form of item
 online
 Isbn
 9783540456827
 Level of compression
 uncompressed
 Media category
 computer
 Media type code
 c
 Other control number
 10.1007/3540456821
 Quality assurance targets
 absent
 Reformatting quality
 access
 Specific material designation
 remote
 System control number

 (CKB)1000000000211652
 (SSID)ssj0000320907
 (PQKBManifestationID)11213464
 (PQKBTitleCode)TC0000320907
 (PQKBWorkID)10258590
 (PQKB)11469524
 (DEHe213)9783540456827
 (MiAaPQ)EBC3071725
 (EXLCZ)991000000000211652
Subject
 Algorithm Analysis and Problem Complexity
 Computational complexity
 Computer Communication Networks
 Computer Communication Networks
 Computer software
 Cryptology
 Data encryption (Computer science)
 Discrete Mathematics in Computer Science
 Information Systems
 Management of Computing and Information Systems
 Operating Systems
 Operating systems (Computers)
Member of
Library Locations

Architecture LibraryBorrow itGould Hall 830 Van Vleet Oval Rm. 105, Norman, OK, 73019, US35.205706 97.445050



Chinese Literature Translation ArchiveBorrow it401 W. Brooks St., RM 414, Norman, OK, 73019, US35.207487 97.447906

Engineering LibraryBorrow itFelgar Hall 865 Asp Avenue, Rm. 222, Norman, OK, 73019, US35.205706 97.445050

Fine Arts LibraryBorrow itCatlett Music Center 500 West Boyd Street, Rm. 20, Norman, OK, 73019, US35.210371 97.448244

Harry W. Bass Business History CollectionBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

History of Science CollectionsBorrow it401 W. Brooks St., Rm. 521NW, Norman, OK, 73019, US35.207487 97.447906

John and Mary Nichols Rare Books and Special CollectionsBorrow it401 W. Brooks St., Rm. 509NW, Norman, OK, 73019, US35.207487 97.447906


Price College Digital LibraryBorrow itAdams Hall 102 307 West Brooks St., Norman, OK, 73019, US35.210371 97.448244

Western History CollectionsBorrow itMonnet Hall 630 Parrington Oval, Rm. 300, Norman, OK, 73019, US35.209584 97.445414
Embed (Experimental)
Settings
Select options that apply then copy and paste the RDF/HTML data fragment to include in your application
Embed this data in a secure (HTTPS) page:
Layout options:
Include data citation:
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT20017th/AAXi7WLSrgE/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT20017th/AAXi7WLSrgE/">Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>
Note: Adjust the width and height settings defined in the RDF/HTML code fragment to best match your requirements
Preview
Cite Data  Experimental
Data Citation of the Item Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource)
Copy and paste the following RDF/HTML data fragment to cite this resource
<div class="citation" vocab="http://schema.org/"><i class="fa faexternallinksquare fafw"></i> Data from <span resource="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT20017th/AAXi7WLSrgE/" typeof="Book http://bibfra.me/vocab/lite/Item"><span property="name http://bibfra.me/vocab/lite/label"><a href="http://link.libraries.ou.edu/portal/AdvancesinCryptology%E2%80%94ASIACRYPT20017th/AAXi7WLSrgE/">Advances in Cryptology — ASIACRYPT 2001 : 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, Australia, December 9–13, 2001. Proceedings, edited by Colin Boyd, (electronic resource)</a></span>  <span property="potentialAction" typeOf="OrganizeAction"><span property="agent" typeof="LibrarySystem http://library.link/vocab/LibrarySystem" resource="http://link.libraries.ou.edu/"><span property="name http://bibfra.me/vocab/lite/label"><a property="url" href="http://link.libraries.ou.edu/">University of Oklahoma Libraries</a></span></span></span></span></div>